CVE-2003-1041 : Detail

CVE-2003-1041

38.67%V3
Network
2004-05-20
02h00 +00:00
2018-10-12
17h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Internet Explorer 5.x and 6.0 allows remote attackers to execute arbitrary programs via a modified directory traversal attack using a URL containing ".." (dot dot) sequences and a filename that ends in "::" which is treated as a .chm file even if it does not have a .chm extension. NOTE: this bug may overlap CVE-2004-0475.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 23504

Publication date : 2003-12-29 23h00 +00:00
Author : Arman Nayyeri
EDB Verified : Yes

source: https://www.securityfocus.com/bid/9320/info Microsoft Windows is prone to a security flaw in the implementation of the showHelp() function. Microsoft previously released patches that provide security measures to prevent abuse of the showHelp() method to reference local compiled help files (.CHM) from within a web page. This initial problem was described in BID 6780/MS03-004. However, using directory traversal sequences and special syntax when referring to the CHM file, it is possible to bypass this restriction. This could be exploited in combination with other known vulnerabilities to install and execute malicious code on a client system. ** UPDATE: This issue was initially believed to affect Microsoft Internet Explorer but is actually an operating system issue. Microsoft Internet Explorer, Outlook, and Outlook Express may all present attack vectors for this security flaw. showHelp("mk:@MSITStore:iexplore.chm::..\\..\\..\\..\\chmfile.chm::/fileinchm.html");

Products Mentioned

Configuraton 0

Microsoft>>Ie >> Version 6

    Microsoft>>Ie >> Version 6.0

      Microsoft>>Internet_explorer >> Version 5

      Microsoft>>Internet_explorer >> Version 5.5

      Microsoft>>Internet_explorer >> Version 5.5

      Microsoft>>Internet_explorer >> Version 5.5

      Microsoft>>Internet_explorer >> Version 6.0

      References

      http://www.us-cert.gov/cas/techalerts/TA04-196A.html
      Tags : third-party-advisory, x_refsource_CERT
      http://www.securityfocus.com/bid/9320
      Tags : vdb-entry, x_refsource_BID
      http://www.kb.cert.org/vuls/id/187196
      Tags : third-party-advisory, x_refsource_CERT-VN
      http://www.securityfocus.com/archive/1/348521
      Tags : mailing-list, x_refsource_BUGTRAQ