The wininet.dll FTP client code in Microsoft Internet Explorer 5.01 and 6 might allow remote attackers to execute arbitrary code via an FTP server response of a specific length that causes a terminating null byte to be written outside of a buffer, which causes heap corruption.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 10.0 | HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
| CWE ID | Type | Source |
|---|---|---|
| NVD-CWE-Other | Primary | nvd@nist.gov |
| Hyperlink | Source | Resource |
|---|---|---|
| http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=473 | secure@microsoft.com | N/A |
| http://secunia.com/advisories/24156 | secure@microsoft.com | N/A |
| http://www.kb.cert.org/vuls/id/613564 | secure@microsoft.com | US Government Resource |
| http://www.osvdb.org/31892 | secure@microsoft.com | N/A |
| http://www.securityfocus.com/archive/1/462303/100/0/threaded | secure@microsoft.com | N/A |
| http://www.securityfocus.com/bid/22489 | secure@microsoft.com | N/A |
| http://www.securitytracker.com/id?1017642 | secure@microsoft.com | N/A |
| http://www.us-cert.gov/cas/techalerts/TA07-044A.html | secure@microsoft.com | US Government Resource |
| http://www.vupen.com/english/advisories/2007/0584 | secure@microsoft.com | N/A |
| https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-016 | secure@microsoft.com | N/A |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1141 | secure@microsoft.com | N/A |