First published: Mon May 02 2005(Updated: )
Internet Explorer 5.01, 5.5, and 6 does not properly validate buffers when handling certain DHTML methods including the createControlRange Javascript function, which allows remote attackers to execute arbitrary code, aka the "DHTML Method Heap Memory Corruption Vulnerability."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Internet Explorer | =6.0-sp1 | |
Microsoft Internet Explorer | =6.0-sp2 | |
Internet Explorer | =5.0.1 | |
Internet Explorer | =5.0.1-sp1 | |
Internet Explorer | =5.0.1-sp2 | |
Internet Explorer | =5.0.1-sp3 | |
Internet Explorer | =5.0.1-sp4 | |
Internet Explorer | =5.5 | |
Internet Explorer | =5.5-sp1 | |
Internet Explorer | =5.5-sp2 | |
Internet Explorer | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0055 is rated as critical due to the potential for remote code execution.
To fix CVE-2005-0055, users should update Internet Explorer to a patched version provided by Microsoft.
CVE-2005-0055 affects Internet Explorer versions 5.01, 5.5, and 6.0 including their various service packs.
CVE-2005-0055 allows remote attackers to execute arbitrary code on the affected systems.
While CVE-2005-0055 primarily affects outdated versions of Internet Explorer, users still operating these versions may remain vulnerable.