Current Description

Buffer overflow in the HTML Converter (HTML32.cnv) on various Windows operating systems allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via cut-and-paste operation, as demonstrated in Internet Explorer 5.0 using a long "align" argument in an HR tag.

Basic Data

PublishedAugust 07, 2003
Last ModifiedOctober 12, 2018
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegetrue

Base Metric V3

No data provided.


  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSMicrosoftWindows 2000********
    2.3OSMicrosoftWindows 2003 Server64-bit*******
    2.3OSMicrosoftWindows 2003 Serverr2*******
    2.3OSMicrosoftWindows 98*gold******
    2.3OSMicrosoftWindows 98se********
    2.3OSMicrosoftWindows Me********
    2.3OSMicrosoftWindows Nt4.0*server*****
    2.3OSMicrosoftWindows Nt4.0*terminal_server*****
    2.3OSMicrosoftWindows Xp**64-bit*****
    2.3OSMicrosoftWindows Xp*gold******

Vulnerable Software List

Microsoft Windows Xp *
Microsoft Windows 98 *
Microsoft Windows 2000 *
Microsoft Windows 2003 Server 64-bit, r2
Microsoft Windows 98se *
Microsoft Windows Nt 4.0
Microsoft Windows Me *


20030701 PoC for Internet Explorer >=5.0 buffer overflow (trivial exploit for hard case).
20030625 Re: Internet Explorer >=5.0 : Buffer overflow
20030622 Internet Explorer >=5.0 : Buffer overflow
CA-2003-14 Government Resource
VU#823260 Government Resource