CVE-2004-0216
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/11/2004
Last modified:
20/11/2024
Description
Integer overflow in the Install Engine (inseng.dll) for Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a malicious website or HTML email with a long .CAB file name, which triggers the integer overflow when calculating a buffer length and leads to a heap-based buffer overflow.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:microsoft:ie:6:windows_server_2003_sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://marc.info/?l=bugtraq&m=109760693512754&w=2
- http://marc.info/?l=bugtraq&m=110616383332055&w=2
- http://marc.info/?l=ntbugtraq&m=110619893620517&w=2
- http://www.kb.cert.org/vuls/id/637760
- http://www.ngssoftware.com/advisories/msinsengfull.txt
- http://www.us-cert.gov/cas/techalerts/TA04-293A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17620
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17651
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5316
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5329
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6100
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6600
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7717
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7865
- http://marc.info/?l=bugtraq&m=109760693512754&w=2
- http://marc.info/?l=bugtraq&m=110616383332055&w=2
- http://marc.info/?l=ntbugtraq&m=110619893620517&w=2
- http://www.kb.cert.org/vuls/id/637760
- http://www.ngssoftware.com/advisories/msinsengfull.txt
- http://www.us-cert.gov/cas/techalerts/TA04-293A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17620
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17651
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5316
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5329
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6100
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6600
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7717
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7865