CVE-2004-0842

Internet Explorer 6.0 SP1 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (application crash from "memory corruption") via certain malformed Cascading Style Sheet (CSS) elements that trigger heap-based buffer overflows, as demonstrated using the "<STYLE>@;/*" string, possibly due to a missing comment terminator that may cause an invalid length to trigger a large memory copy operation, aka the "CSS Heap Memory Corruption Vulnerability."
References
Link Resource
http://marc.info/?l=bugtraq&m=109107496214572&w=2
http://marc.info/?l=full-disclosure&m=109060455614702&w=2
http://marc.info/?l=full-disclosure&m=109102919426844&w=2
http://secunia.com/advisories/12806
http://www.ciac.org/ciac/bulletins/p-006.shtml
http://www.ecqurity.com/adv/IEstyle.html Exploit Vendor Advisory
http://www.kb.cert.org/vuls/id/291304 US Government Resource
http://www.securiteam.com/exploits/5NP042KF5A.html
http://www.securityfocus.com/bid/10816 Exploit Patch Vendor Advisory
http://www.us-cert.gov/cas/techalerts/TA04-293A.html US Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038
https://exchange.xforce.ibmcloud.com/vulnerabilities/16675
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2906
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3372
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4169
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5592
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6579
http://marc.info/?l=bugtraq&m=109107496214572&w=2
http://marc.info/?l=full-disclosure&m=109060455614702&w=2
http://marc.info/?l=full-disclosure&m=109102919426844&w=2
http://secunia.com/advisories/12806
http://www.ciac.org/ciac/bulletins/p-006.shtml
http://www.ecqurity.com/adv/IEstyle.html Exploit Vendor Advisory
http://www.kb.cert.org/vuls/id/291304 US Government Resource
http://www.securiteam.com/exploits/5NP042KF5A.html
http://www.securityfocus.com/bid/10816 Exploit Patch Vendor Advisory
http://www.us-cert.gov/cas/techalerts/TA04-293A.html US Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038
https://exchange.xforce.ibmcloud.com/vulnerabilities/16675
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2906
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3372
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4169
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5592
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6579
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:avaya:ip600_media_servers:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp3:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*
cpe:2.3:h:avaya:definity_one_media_server:*:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s3400:*:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8100:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:avaya:modular_messaging_message_storage_server:1.1:*:*:*:*:*:*:*
cpe:2.3:o:avaya:modular_messaging_message_storage_server:2.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:49

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=109107496214572&w=2 - () http://marc.info/?l=bugtraq&m=109107496214572&w=2 -
References () http://marc.info/?l=full-disclosure&m=109060455614702&w=2 - () http://marc.info/?l=full-disclosure&m=109060455614702&w=2 -
References () http://marc.info/?l=full-disclosure&m=109102919426844&w=2 - () http://marc.info/?l=full-disclosure&m=109102919426844&w=2 -
References () http://secunia.com/advisories/12806 - () http://secunia.com/advisories/12806 -
References () http://www.ciac.org/ciac/bulletins/p-006.shtml - () http://www.ciac.org/ciac/bulletins/p-006.shtml -
References () http://www.ecqurity.com/adv/IEstyle.html - Exploit, Vendor Advisory () http://www.ecqurity.com/adv/IEstyle.html - Exploit, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/291304 - US Government Resource () http://www.kb.cert.org/vuls/id/291304 - US Government Resource
References () http://www.securiteam.com/exploits/5NP042KF5A.html - () http://www.securiteam.com/exploits/5NP042KF5A.html -
References () http://www.securityfocus.com/bid/10816 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/10816 - Exploit, Patch, Vendor Advisory
References () http://www.us-cert.gov/cas/techalerts/TA04-293A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA04-293A.html - US Government Resource
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16675 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16675 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2906 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2906 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3372 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3372 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4169 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4169 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5592 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5592 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6579 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6579 -

23 Jul 2021, 12:55

Type Values Removed Values Added
CPE cpe:2.3:a:microsoft:ie:5.5:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:5.0.1:sp3:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:5.0.1:sp4:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:5.5:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:6.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:5.0.1:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:5.0.1:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:5.5:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp3:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*

Information

Published : 2004-12-23 05:00

Updated : 2024-11-20 23:49


NVD link : CVE-2004-0842

Mitre link : CVE-2004-0842

CVE.ORG link : CVE-2004-0842


JSON object : View

Products Affected

avaya

  • ip600_media_servers
  • s3400
  • definity_one_media_server
  • s8100
  • modular_messaging_message_storage_server

microsoft

  • internet_explorer
  • ie