Overview
Microsoft Internet Explorer (IE) will execute an HTML Application (HTA) referenced by the DATA attribute of an OBJECT element if the Content-Type header returned by the web server is set to "application/hta". An attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user running IE.
Note: (2003-10-04) The patch provided by MS03-040 addresses two attack vectors that were not resolved by MS03-032.
Description
1. The OBJECT element |
Impact
By convincing a victim to view an HTML document (web page, HTML email), a remote attacker could execute arbitrary code with the privileges of the victim. |
Solution
Apply patch |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.eeye.com/html/Research/Advisories/AD20030820.html
- http://www.microsoft.com/technet/security/bulletin/MS03-032.asp
- http://support.microsoft.com/default.aspx?scid=kb;en-us;822925
- http://msdn.microsoft.com/workshop/networking/moniker/overview/appendix_a.asp
- http://msdn.microsoft.com/workshop/author/dhtml/reference/objects/object.asp
- http://msdn.microsoft.com/workshop/author/hta/overview/htaoverview.asp
- http://msdn.microsoft.com/workshop/author/hta/reference/objects/hta.asp
- http://msdn.microsoft.com/workshop/author/om/doc_object.asp
- http://msdn.microsoft.com/workshop/author/databind/data_binding.asp
- http://www.ietf.org/rfc/rfc2616.txt
- http://www.secunia.com/advisories/9580/
- http://www.securityfocus.com/archive/1/334459
- http://xforce.iss.net/xforce/xfdb/12960
- http://lists.netsys.com/pipermail/full-disclosure/2003-September/009639.html
- http://lists.netsys.com/pipermail/full-disclosure/2003-September/009665.html
- http://lists.netsys.com/pipermail/full-disclosure/2003-September/009671.html
- http://greymagic.com/adv/gm001-ie/
- http://securityresponse.symantec.com/avcenter/venc/data/backdoor.coreflood.dr.html
- http://securityresponse1.symantec.com/sarc/sarc.nsf/html/backdoor.coreflood.html
- http://securityresponse.symantec.com/avcenter/venc/data/download.aduent.trojan.html
- http://www.symantec.com/avcenter/venc/data/trojan.qhosts.html
- http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0310&L=ntbugtraq&F=P&S=&P=2603
- http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0309&L=ntbugtraq&F=P&S=&P=784
- http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0838
- http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0809
- http://pivx.com/larholm/unpatched/
Acknowledgements
Microsoft credits eEye Digital Security for reporting this vulnerability. Information used in this document came from eEye, Microsoft, and http_equiv.
This document was written by Art Manion.
Other Information
CVE IDs: | CVE-2003-0532 |
CERT Advisory: | CA-2003-22 |
Severity Metric: | 56.70 |
Date Public: | 2003-08-20 |
Date First Published: | 2003-08-25 |
Date Last Updated: | 2009-07-30 00:25 UTC |
Document Revision: | 134 |