CVE-2002-0371
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/07/2002
Last modified:
20/11/2024
Description
Buffer overflow in gopher client for Microsoft Internet Explorer 5.1 through 6.0, Proxy Server 2.0, or ISA Server 2000 allows remote attackers to execute arbitrary code via a gopher:// URL that redirects the user to a real or simulated gopher server that sends a long response.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:isa_server:2000:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:isa_server:2000:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:proxy_server:2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:proxy_server:2.0:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:university_of_minnesota:gopher:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://marc.info/?l=bugtraq&m=102320516707940&w=2
- http://marc.info/?l=bugtraq&m=102397955217618&w=2
- http://online.securityfocus.com/archive/1/276848
- http://www.iss.net/security_center/static/9247.php
- http://www.kb.cert.org/vuls/id/440275
- http://www.pivx.com/workaround_fail.html
- http://www.securityfocus.com/bid/4930
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-027
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A98
- http://marc.info/?l=bugtraq&m=102320516707940&w=2
- http://marc.info/?l=bugtraq&m=102397955217618&w=2
- http://online.securityfocus.com/archive/1/276848
- http://www.iss.net/security_center/static/9247.php
- http://www.kb.cert.org/vuls/id/440275
- http://www.pivx.com/workaround_fail.html
- http://www.securityfocus.com/bid/4930
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-027
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A98