First published: Wed May 29 2002(Updated: )
Microsoft Internet Explorer 5.01 and 6.0 allow remote attackers to execute arbitrary code via malformed Content-Disposition and Content-Type header fields that cause the application for the spoofed file type to pass the file back to the operating system for handling rather than raise an error message, aka the first variant of the "Content Disposition" vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =5.0.1 | |
Internet Explorer | =5.0.1-sp2 | |
Internet Explorer | =5.0.1-sp1 | |
Internet Explorer | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0193 is considered a critical vulnerability as it allows remote attackers to execute arbitrary code.
To mitigate CVE-2002-0193, you should upgrade to a newer, secure version of Microsoft Internet Explorer.
CVE-2002-0193 affects Microsoft Internet Explorer 5.01 and 6.0.
CVE-2002-0193 can be exploited by attackers to execute malicious code on a victim's system through malformed header fields.
Monitoring for unusual file execution patterns or unexpected popup errors in Internet Explorer can help detect exploitation of CVE-2002-0193.