National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2004-0839 Detail

Description

Internet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, as demonstrated by "wottapoop.html".

Source:  MITRE      Last Modified:  08/18/2004

Quick Info

CVE Dictionary Entry:
CVE-2004-0839
Original release date:
08/18/2004
Last revised:
10/10/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
5.0 MEDIUM
Vector:
(AV:N/AC:L/Au:N/C:N/I:P/A:N) (legend)
Impact Subscore:
2.9
Exploitability Subscore:
10.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized modification

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://marc.info/?l=bugtraq&m=109303291513335&w=2 External Source BUGTRAQ 20040818 What A Drag II XP SP2
http://marc.info/?l=bugtraq&m=109336221826652&w=2 External Source BUGTRAQ 20040824 What A Drag! -revisited-
http://seclists.org/lists/fulldisclosure/2004/Aug/0868.html Vendor Advisory External Source FULLDISC 20040818 What A Drag II XP SP2
http://www.kb.cert.org/vuls/id/526089 Patch; Third Party Advisory; US Government Resource External Source CERT-VN VU#526089
http://www.microsoft.com/technet/security/bulletin/ms04-038.mspx Patch; Vendor Advisory External Source MS MS04-038
http://www.securityfocus.com/bid/10973 Exploit; Patch; Vendor Advisory External Source BID 10973
http://www.us-cert.gov/cas/techalerts/TA04-293A.html Patch; Third Party Advisory; US Government Resource External Source CERT TA04-293A
https://exchange.xforce.ibmcloud.com/vulnerabilities/17044 External Source XF ie-dragdrop-code-execution(17044)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1563 External Source OVAL oval:org.mitre.oval:def:1563
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2073 External Source OVAL oval:org.mitre.oval:def:2073
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3773 External Source OVAL oval:org.mitre.oval:def:3773
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4152 External Source OVAL oval:org.mitre.oval:def:4152
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6272 External Source OVAL oval:org.mitre.oval:def:6272
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7721 External Source OVAL oval:org.mitre.oval:def:7721

References to Check Content

Identifier:
oval:org.mitre.oval:def:1563
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:1563
Identifier:
oval:org.mitre.oval:def:2073
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:2073
Identifier:
oval:org.mitre.oval:def:3773
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:3773
Identifier:
oval:org.mitre.oval:def:4152
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:4152
Identifier:
oval:org.mitre.oval:def:6272
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:6272
Identifier:
oval:org.mitre.oval:def:7721
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:7721

Technical Details

Vulnerability Type (View All)

Vulnerable software and versions Switch to CPE 2.2

Configuration 1
OR
cpe:2.3:a:avaya:ip600_media_servers:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:5.0.1:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:5.0.1:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:5.0.1:sp3:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:5.0.1:sp4:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:5.5:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:5.5:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:5.5:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:6.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:ie:6.0:sp2:*:*:*:*:*:*
cpe:2.3:h:avaya:definity_one_media_server:*:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s3400:*:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8100:*:*:*:*:*:*:*:*
Configuration 2
OR
cpe:2.3:a:nortel:ip_softphone_2050:*:*:*:*:*:*:*:*
cpe:2.3:a:nortel:mobile_voice_client_2050:*:*:*:*:*:*:*:*
cpe:2.3:a:nortel:optivity_telephony_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:nortel:symposium_web_centre_portal:*:*:*:*:*:*:*:*
cpe:2.3:a:nortel:symposium_web_client:*:*:*:*:*:*:*:*
cpe:2.3:o:avaya:modular_messaging_message_storage_server:1.1:*:*:*:*:*:*:*
cpe:2.3:o:avaya:modular_messaging_message_storage_server:2.0:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:*:advanced_server:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:*:datacenter_server:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:*:professional:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:*:server:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp1:advanced_server:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp1:datacenter_server:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp1:professional:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp1:server:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp2:advanced_server:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp2:datacenter_server:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp2:professional:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp2:server:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp3:advanced_server:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp3:datacenter_server:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp3:professional:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp3:server:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp4:advanced_server:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp4:datacenter_server:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp4:professional:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp4:server:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History 5 change records found - show changes