CVE-2004-1050

Scores

EPSS

0.791medium79.1%
0%20%40%60%80%100%

Percentile: 79.1%

CVSS

10.0critical2.0
0246810

CVSS Score: 10.0/10

All CVSS Scores

CVSS 2.0
10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Description

Heap-based buffer overflow in Internet Explorer 6 allows remote attackers to execute arbitrary code via long (1) SRC or (2) NAME attributes in IFRAME, FRAME, and EMBED elements, as originally discovered using the mangleme utility, aka “the IFRAME vulnerability” or the “HTML Elements Vulnerability.”

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

Exploits

Exploit ID: 612

Source: exploitdb

URL: https://www.exploit-db.com/exploits/612

Recommendations

Source: nvd

Apply a PatchApply the patch referenced in MS04-040.Install Windows XP Service Pack 2 (SP2)Microsoft Windows XP SP2 is not affected by this vulnerability.Disable Active scriptingDisabling Active scripting makes it somwehat more difficult for an attacker to prepare the heap to easily execute arbitrary code. At a minimum, disable Active scripting in the Internet zone and the zone used by Outlook, Outlook Express, or any other software that uses the WebBrowser ActiveX control. Instructions for disabling Active scripting can be found in the Malicious Web Scripts FAQ. Note that an attacker may be able to prepare the heap using other techinques, in which case disabling Active scripting would only provides defense against attacks that use Active scripting.Do not follow unsolicited linksDo not click on unsolicited URLs received in email, instant messages, web forums, or internet relay chat (IRC) channels.Use current versions of Outlook or Outlook ExpressBy default, Outlook Express 6, Outlook 2002, and Outlook 2003 use the Restricted Sites Zone to display HTML messages. Because IFRAME and FRAME elements are not rendered in the Restricted Sites Zone, these email clients do not act as attack vectors by default.Render email in plain textConfigure email client software (mail user agent [MUA]) to render email messages in plain text. Instructions to configure Outlook 2002, Outlook 2003, and Outlook Express 6 are available in Microsoft Knowledge Base Articles 307594, 831607, and 291387, respectively.Maintain updated antivirus softwareAntivirus software with updated virus definitions may identify and prevent some exploit attempts. Variations of exploits or attack vectors may not be detected. Do not rely on antivirus software to defend against this vulnerability.

URL: http://www.kb.cert.org/vuls/id/842160

Vulnerable Software (7)

Type: Configuration

Vendor: avaya

Product: definity_one_media_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:avaya:ip600_media_servers:*:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:avaya:ip600_media_servers:r6:*:*:*:...

Source: nvd

Type: Configuration

Vendor: avaya

Product: ip600_media_servers

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:avaya:ip600_media_servers:*:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:avaya:ip600_media_servers:r6:*:*:*:...

Source: nvd

Type: Configuration

Vendor: avaya

Product: modular_messaging_message_storage_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:avaya:modular_messaging_message_storage_server:s3400:*:*:*:*:*:*:*",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

Type: Configuration

Vendor: avaya

Product: s3400

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:avaya:ip600_media_servers:*:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:avaya:ip600_media_servers:r6:*:*:*:...

Source: nvd

Type: Configuration

Vendor: avaya

Product: s8100

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:avaya:ip600_media_servers:*:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:avaya:ip600_media_servers:r6:*:*:*:...

Source: nvd

Type: Configuration

Vendor: microsoft

Product: ie

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:avaya:ip600_media_servers:*:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:avaya:ip600_media_servers:r6:*:*:*:...

Source: nvd

Type: Configuration

Vendor: microsoft

Product: internet_explorer

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:avaya:ip600_media_servers:*:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:avaya:ip600_media_servers:r6:*:*:*:...

Source: nvd