CVE-2003-0469
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/08/2003
Last modified:
03/04/2025
Description
Buffer overflow in the HTML Converter (HTML32.cnv) on various Windows operating systems allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via cut-and-paste operation, as demonstrated in Internet Explorer 5.0 using a long "align" argument in an HR tag.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:64-bit:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/006155.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2003-June/006067.html
- http://marc.info/?l=bugtraq&m=105639925122961&w=2
- http://www.cert.org/advisories/CA-2003-14.html
- http://www.kb.cert.org/vuls/id/823260
- http://www.securityfocus.com/bid/8016
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-023
- http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/006155.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2003-June/006067.html
- http://marc.info/?l=bugtraq&m=105639925122961&w=2
- http://www.cert.org/advisories/CA-2003-14.html
- http://www.kb.cert.org/vuls/id/823260
- http://www.securityfocus.com/bid/8016
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-023