ID CVE-2003-0306
Summary Buffer overflow in EXPLORER.EXE on Windows XP allows attackers to execute arbitrary code as the XP user via a desktop.ini file with a long .ShellClassInfo parameter.
References
Vulnerable Configurations
  • cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*
CVSS
Base: 7.2 (as of 12-10-2018 - 21:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:C/I:C/A:C
oval via4
accepted 2011-05-16T04:02:42.419-04:00
class vulnerability
contributors
  • name Ingrid Skoog
    organization The MITRE Corporation
  • name Ingrid Skoog
    organization The MITRE Corporation
  • name Shane Shaffer
    organization G2, Inc.
  • name Sudhir Gandhe
    organization Telos
  • name Shane Shaffer
    organization G2, Inc.
description Buffer overflow in EXPLORER.EXE on Windows XP allows attackers to execute arbitrary code as the XP user via a desktop.ini file with a long .ShellClassInfo parameter.
family windows
id oval:org.mitre.oval:def:3095
status accepted
submitted 2004-07-14T12:00:00.000-04:00
title WinXP Explorer Buffer Overflow
version 70
refmap via4
bugtraq
  • 20030511 Detailed analysis: Buffer overflow in Explorer.exe on Windows XP SP1
  • 20030515 Re[2]: EXPLOIT: Buffer overflow in Explorer.exe on Windows XP SP1
vuln-dev 20030507 Buffer overflow in Explorer.exe
Last major update 12-10-2018 - 21:32
Published 09-06-2003 - 04:00
Last modified 12-10-2018 - 21:32
Back to Top