Overview
A race condition in the way that Internet Explorer handles DHTML objects may allow a remote attacker to execute arbitrary code on a vulnerable system.
Description
Dynamic HTML (DHTML) is built on an object model that extends the traditional static HTML document which enables Web authors to create more engaging and interactive Web pages. |
Impact
By convincing a user to view an HTML document (e.g., a web page or HTML email message), an attacker could execute arbitrary commands or code with the privileges of the user. The attacker could take any action as the user. If the user has administrative privileges, the attacker could take complete control of the user's system. |
Solution
Apply a patch |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was publicly reported by Microsoft who credits Berend-Jan Wever working with iDEFENSE.
This document was written by Jeff Gennari and Will Dormann.
Other Information
CVE IDs: | CVE-2005-0553 |
Severity Metric: | 21.80 |
Date Public: | 2005-04-12 |
Date First Published: | 2005-04-12 |
Date Last Updated: | 2005-08-18 15:44 UTC |
Document Revision: | 31 |