First published: Fri Aug 22 2003(Updated: )
Internet Explorer 5.01 SP3 through 6.0 SP1 does not properly determine object types that are returned by web servers, which could allow remote attackers to execute arbitrary code via an object tag with a data parameter to a malicious file hosted on a server that returns an unsafe Content-Type, aka the "Object Type" vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Internet Explorer | =6.0-sp1 | |
Internet Explorer | =5.0.1 | |
Internet Explorer | =5.0.1-sp1 | |
Internet Explorer | =5.0.1-sp2 | |
Internet Explorer | =5.0.1-sp3 | |
Internet Explorer | =5.5 | |
Internet Explorer | =5.5-sp1 | |
Internet Explorer | =5.5-sp2 | |
Internet Explorer | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0532 has a critical severity rating as it allows remote code execution through manipulated web server responses.
To fix CVE-2003-0532, users should upgrade to a supported version of Internet Explorer, preferably beyond version 6.0 SP1.
CVE-2003-0532 affects Internet Explorer versions 5.01 SP3 through 6.0 SP1.
CVE-2003-0532 can be exploited through a remote code execution attack via malicious content served by a web server.
Yes, CVE-2003-0532 can potentially be exploited automatically without direct user interaction if the victim accesses a specially crafted web page.