The HTML rendering engine in Microsoft Internet Explorer 6.0 allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML in corrupted images and other files such as .GIF, JPG, and WAV, which is rendered as HTML when the user clicks on the link, even though the web server response and file extension indicate that it should be treated as a different file type.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=113017003617987&w=2 | |
http://securityreason.com/securityalert/18 | |
http://www.computec.ch/download.php?view.683 | Exploit |
http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=1746 | Exploit Vendor Advisory |
http://www.securiteam.com/windowsntfocus/6F00B00EBY.html | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2005-10-26T04:00:00
Updated: 2016-10-17T13:57:01
Reserved: 2005-10-26T00:00:00
Link: CVE-2005-3312
JSON object: View
NVD Information
Status : Modified
Published: 2005-10-26T10:02:00.000
Modified: 2021-07-23T12:55:03.667
Link: CVE-2005-3312
JSON object: View
Redhat Information
No data.
CWE