// For flags

CVE-2003-0815

 

Severity Score

7.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Internet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and read arbitrary files by (1) modifying the createTextRange method and using CreateLink, as demonstrated using LinkillerSaveRef, LinkillerJPU, and Linkiller, or (2) modifying the createRange method and using the FIND dialog to select text, as demonstrated using Findeath, aka the "Function Pointer Override Cross Domain" vulnerability.

Internet Explorer 6 SP1 y anteriores permite que atacantes remotos se salten restricciones de seguridad y lean ficheros arbitrario mediante (1) modificando el método createTextRange y usando CreateLink, como se demuestra usando LinkillerSaveRef, LinkillerJPU, yLinkiller. Y (2) modificando el método createRange y usando el diálogo FIND para seleccionar texto, como se demuestra usando Findeath. También se la conoce como vulnerabilidad ""Function Pointer Override Cross Domain"".

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2003-09-18 CVE Reserved
  • 2004-01-14 CVE Published
  • 2024-06-24 EPSS Updated
  • 2024-08-08 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (22)
URL Tag Source
http://marc.info/?l=bugtraq&m=106321757619047&w=2 Mailing List
http://marc.info/?l=bugtraq&m=106322542104656&w=2 Mailing List
http://secunia.com/advisories/10192 Third Party Advisory
http://securitytracker.com/id?1007687 Vdb Entry
http://www.ciac.org/ciac/bulletins/o-021.shtml Government Resource
http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2003-09/0150.html Mailing List
http://www.osvdb.org/7888 Vdb Entry
http://www.osvdb.org/7889 Vdb Entry
http://www.safecenter.net/UMBRELLAWEBV4/Linkiller/Linkiller-Content.HTM X_refsource_misc
http://www.safecenter.net/UMBRELLAWEBV4/LinkillerJPU/LinkillerJPU-Content.HTM X_refsource_misc
http://www.safecenter.net/UMBRELLAWEBV4/LinkillerSaveRef/LinkillerSaveRef-Content.HTM X_refsource_misc
http://www.securityfocus.com/archive/1/337086 Mailing List
https://exchange.xforce.ibmcloud.com/vulnerabilities/13676 Vdb Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A351 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A352 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A353 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A356 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A357 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A359 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A472 Signature
URL Date SRC
URL Date SRC
http://www.securityfocus.com/bid/9014 2021-07-23
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Microsoft
Search vendor "Microsoft"
Ie
Search vendor "Microsoft" for product "Ie"
6.0
Search vendor "Microsoft" for product "Ie" and version "6.0"
sp1
Affected
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
5.0.1
Search vendor "Microsoft" for product "Internet Explorer" and version "5.0.1"
-
Affected
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
5.0.1
Search vendor "Microsoft" for product "Internet Explorer" and version "5.0.1"
sp1
Affected
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
5.0.1
Search vendor "Microsoft" for product "Internet Explorer" and version "5.0.1"
sp2
Affected
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
5.0.1
Search vendor "Microsoft" for product "Internet Explorer" and version "5.0.1"
sp3
Affected
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
5.5
Search vendor "Microsoft" for product "Internet Explorer" and version "5.5"
-
Affected
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
5.5
Search vendor "Microsoft" for product "Internet Explorer" and version "5.5"
sp1
Affected
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
5.5
Search vendor "Microsoft" for product "Internet Explorer" and version "5.5"
sp2
Affected
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
6.0
Search vendor "Microsoft" for product "Internet Explorer" and version "6.0"
-
Affected