First published: Wed Oct 08 2003(Updated: )
Internet Explorer 5.01 through 6.0 does not properly handle object tags returned from a Web server during XML data binding, which allows remote attackers to execute arbitrary code via an HTML e-mail message or web page.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Internet Explorer | =6.0-sp1 | |
Internet Explorer | =5.0.1 | |
Internet Explorer | =5.0.1-sp1 | |
Internet Explorer | =5.0.1-sp2 | |
Internet Explorer | =5.0.1-sp3 | |
Internet Explorer | =5.5 | |
Internet Explorer | =5.5-sp1 | |
Internet Explorer | =5.5-sp2 | |
Internet Explorer | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0809 has a critical severity rating due to its potential for arbitrary code execution.
To fix CVE-2003-0809, users should upgrade to a patched version of Internet Explorer or apply the relevant security updates provided by Microsoft.
CVE-2003-0809 affects Internet Explorer versions 5.01 through 6.0, including various service packs.
CVE-2003-0809 allows remote attackers to execute arbitrary code via crafted HTML e-mail messages or web pages.
Yes, CVE-2003-0809 is a well-documented vulnerability discovered in 2003.