CVE-2003-1027
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
20/01/2004
Last modified:
03/04/2025
Description
Internet Explorer 5.01 through 6 SP1 allows remote attackers to direct drag and drop behaviors and other mouse click actions to other windows by using method caching (SaveRef) to access the window.moveBy method, which is otherwise inaccessible, as demonstrated by HijackClickV2, a different vulnerability than CVE-2003-0823, aka the "Function Pointer Drag and Drop Vulnerability."
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp3:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://marc.info/?l=bugtraq&m=106979479719446&w=2
- http://marc.info/?l=bugtraq&m=107038202225587&w=2
- http://www.kb.cert.org/vuls/id/413886
- http://www.safecenter.net/UMBRELLAWEBV4/HijackClickV2
- http://www.securitytracker.com/id?1006036=
- http://www.us-cert.gov/cas/techalerts/TA04-033A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-004
- https://exchange.xforce.ibmcloud.com/vulnerabilities/13844
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A527
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A529
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A530
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A531
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A532
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A534
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A629
- http://marc.info/?l=bugtraq&m=106979479719446&w=2
- http://marc.info/?l=bugtraq&m=107038202225587&w=2
- http://www.kb.cert.org/vuls/id/413886
- http://www.safecenter.net/UMBRELLAWEBV4/HijackClickV2
- http://www.securitytracker.com/id?1006036=
- http://www.us-cert.gov/cas/techalerts/TA04-033A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-004
- https://exchange.xforce.ibmcloud.com/vulnerabilities/13844
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A527
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A529
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A530
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A531
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A532
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A534
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A629