First published: Wed May 29 2002(Updated: )
Microsoft Internet Explorer 5.01 and 6.0 allow remote attackers to execute arbitrary code via malformed Content-Disposition and Content-Type header fields that cause the application for the spoofed file type to pass the file back to the operating system for handling rather than raise an error message, aka the second variant of the "Content Disposition" vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =5.01 | |
Internet Explorer | =5.01-sp1 | |
Internet Explorer | =5.01-sp2 | |
Internet Explorer | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0188 is considered to have a high severity due to its potential for remote code execution.
To mitigate CVE-2002-0188, it is recommended to upgrade to a newer version of Microsoft Internet Explorer or apply available patches.
CVE-2002-0188 affects Microsoft Internet Explorer versions 5.01 and 6.0.
CVE-2002-0188 allows remote attackers to execute arbitrary code via malformed header fields.
Yes, CVE-2002-0188 can significantly impact system security by allowing attackers to execute unauthorized code.