First published: Fri Aug 22 2003(Updated: )
Buffer overflow in Internet Explorer 6 SP1 for certain languages that support double-byte encodings (e.g., Japanese) allows remote attackers to execute arbitrary code via the Type property of an Object tag, a variant of CVE-2003-0344.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Internet Explorer | =6.0 | |
Internet Explorer | =5.01 | |
Internet Explorer | =5.5 | |
Internet Explorer | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0701 has a high severity rating due to its potential for remote code execution.
Mitigation for CVE-2003-0701 involves applying the latest patches from Microsoft for Internet Explorer.
CVE-2003-0701 affects Internet Explorer 5.01, 5.5, and 6.0, particularly for certain double-byte language settings.
Exploiting CVE-2003-0701 could allow attackers to execute arbitrary code on the affected system.
If using an affected version of Internet Explorer, you should immediately update your browser to the latest version or apply any available security patches.