CVE-2004-0549

N/A Unknown
Published: August 06, 2004 Modified: April 16, 2026
View on NVD

Description

The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.kb.cert.org/vuls/id/713878
Source: cve@mitre.org
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA04-163A.html
Source: cve@mitre.org
Patch Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA04-184A.html
Source: cve@mitre.org
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA04-212A.html
Source: cve@mitre.org
US Government Resource
http://62.131.86.111/analysis.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=108786396622284&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=108852642021426&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://umbrella.name/originalvuln/msie/InsiderPrototype/
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/713878
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA04-163A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA04-184A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA04-212A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
https://exchange.xforce.ibmcloud.com/vulnerabilities/16348
Source: af854a3a-2127-422b-91ae-364da2661108

32 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
69.0%
99th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

microsoft