{"vuid":"VU#813208","idnumber":"813208","name":"Microsoft Internet Explorer does not properly render input type tag","keywords":["ms03-032","internet explorer","ie","outlook express"],"overview":"Microsoft Internet Explorer (IE) does not properly render an input type tag, allowing a remote attacker to cause a denial of service.","clean_desc":"Microsoft Security Bulletin MS03-032 briefly describes ...a flaw in the way Internet Explorer renders Web pages that could cause the browser or Outlook Express to fail. Internet Explorer does not properly render an input type tag. A user visiting an attacker's Web site could allow the attacker to exploit the vulnerability by viewing the site. In addition, an attacker could craft a specially formed HTML based e-mail that could cause Outlook Express to fail when the e-mail was opened or previewed. This is the only information available about this vulnerability.","impact":"By convincing a victim to view a specially crafted HTML document (web page, HTML email) , a remote attacker could cause a denial of service.","resolution":"Apply patch\nApply 822925 or a more recent cumulative patch for IE. See Microsoft Security Bulletin MS03-032.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Microsoft.","author":"This document was written by Art Manion.","public":["h","t","t","p",":","/","/","w","w","w",".","m","i","c","r","o","s","o","f","t",".","c","o","m","/","t","e","c","h","n","e","t","/","s","e","c","u","r","i","t","y","/","b","u","l","l","e","t","i","n","/","M","S","0","3","-","0","3","2",".","a","s","p"],"cveids":[""],"certadvisory":"CA-2003-22","uscerttechnicalalert":null,"datecreated":"2003-08-25T15:36:07Z","publicdate":"2003-08-20T00:00:00Z","datefirstpublished":"2003-08-26T07:02:29Z","dateupdated":"2003-09-03T23:24:53Z","revision":13,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"14","cam_exploitation":"0","cam_internetinfrastructure":"1","cam_population":"18","cam_impact":"3","cam_easeofexploitation":"12","cam_attackeraccessrequired":"20","cam_scorecurrent":"3.645","cam_scorecurrentwidelyknown":"5.103","cam_scorecurrentwidelyknownexploited":"9.963","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":3.645,"vulnote":null}