Required CVE Record Information
Description
Buffer overflow in the implementation of an HTML directive in mshtml.dll in Internet Explorer 5.5 and 6.0 allows remote attackers to execute arbitrary code via a web page that specifies embedded ActiveX controls in a way that causes 2 Unicode strings to be concatenated.
References 7 Total
- cert.org: CA-2002-04 third-party-advisory
- marc.info: 20020213 dH & SECURITY.NNOV: buffer overflow in mshtml.dll mailing-list
- oval.cisecurity.org: oval:org.mitre.oval:def:925 vdb-entrysignature
- iss.net: ie-html-directive-bo(8116) vdb-entry
- docs.microsoft.com: MS02-005 vendor-advisory
- online.securityfocus.com: 20020227 Details and exploitation of buffer overflow in mshtml.dll (and few sidenotes on Unicode overflows in general) mailing-list
- securityfocus.com: 4080 vdb-entry
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 7 Total
- cert.org: CA-2002-04 third-party-advisoryx_transferred
- marc.info: 20020213 dH & SECURITY.NNOV: buffer overflow in mshtml.dll mailing-listx_transferred
- oval.cisecurity.org: oval:org.mitre.oval:def:925 vdb-entrysignaturex_transferred
- iss.net: ie-html-directive-bo(8116) vdb-entryx_transferred
- docs.microsoft.com: MS02-005 vendor-advisoryx_transferred
- online.securityfocus.com: 20020227 Details and exploitation of buffer overflow in mshtml.dll (and few sidenotes on Unicode overflows in general) mailing-listx_transferred
- securityfocus.com: 4080 vdb-entryx_transferred