{"vuid":"VU#334928","idnumber":"334928","name":"Microsoft Internet Explorer contains buffer overflow in Type attribute of OBJECT element on double-byte character set systems","keywords":["ms03-032","internet explorer","ie","microsoft","windows ms03-020","dbcs"],"overview":"Certain versions of Microsoft Internet Explorer (IE) that support double-byte character sets (DBCS) contain a buffer overflow vulnerability in the Type attribute of the OBJECT element. A remote attacker could execute arbitrary code with the privileges of the user running IE.","clean_desc":"Microsoft Security Bulletin MS03-032 and SNS Advisory No.68 describe a buffer overflow vulnerability in the Type attribute of the OBJECT element. This vulnerability only affects double-byte character set versions of IE (e.g. Japanese) and may be related to VU#679556/CAN-2003-0344/MS030-020.","impact":"By convincing a victim to view an HTML document (web site, HTML email message), a remote attacker could execute arbitrary code with the privileges of the victim.","resolution":"Apply patch\nApply 822925 or a more recent cumulative patch for IE. See Microsoft Security Bulletin MS03-032.","workarounds":"","sysaffected":"","thanks":"Microsoft credits LAC/SNS for reporting this vulnerability. Information used in this document came from LAC/SNS and Microsoft.","author":"This document was written by Art Manion.","public":["http://www.lac.co.jp/security/english/snsadv_e/68_e.html","http://www.microsoft.com/technet/security/bulletin/MS03-032.asp","http://msdn.microsoft.com/workshop/author/dhtml/reference/objects/object.asp","http://xforce.iss.net/xforce/xfdb/12970","http://www.securityfocus.com/bid/7806"],"cveids":["CVE-2003-0701"],"certadvisory":"CA-2003-22","uscerttechnicalalert":null,"datecreated":"2003-08-25T15:27:31Z","publicdate":"2003-08-20T00:00:00Z","datefirstpublished":"2003-08-26T04:49:51Z","dateupdated":"2005-08-11T20:50:08Z","revision":17,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"14","cam_exploitation":"0","cam_internetinfrastructure":"6","cam_population":"9","cam_impact":"15","cam_easeofexploitation":"7","cam_attackeraccessrequired":"20","cam_scorecurrent":"7.0875","cam_scorecurrentwidelyknown":"9.21375","cam_scorecurrentwidelyknownexploited":"16.30125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.0875,"vulnote":null}