CVE-2005-2127
CVSS7.5
发布时间 :2005-08-19 00:00:00
修订时间 :2016-11-07 17:18:01
NMCOPS    

[原文]Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."


[CNNVD]Microsoft Visual Studio .NET 远程代码执行漏洞(CNNVD-200508-200)

        Visual Studio .NET是用于创建和集成XML Web服务和应用程序的综合开发工具。
        Microsoft Visual Studio .NET中的漏洞可能允许攻击者远程执行任意代码。目前更多信息不详。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CWE (弱点类目)

CWE-119 [内存缓冲区边界内操作的限制不恰当]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:visio:2003Microsoft Visio 2003
cpe:/a:microsoft:visio:2002Microsoft Visio 2002
cpe:/a:microsoft:office:2000Microsoft Office 2000
cpe:/a:microsoft:visio:2002::professional
cpe:/a:microsoft:visio:2000:sr1:enterpriseMicrosoft Visio 2000 sr1 enterprise
cpe:/a:microsoft:visio:2003::professional
cpe:/a:microsoft:visio:2002:sp2:standardMicrosoft Visio 2002_sp2 standard
cpe:/a:microsoft:office:2000:::japanese
cpe:/a:microsoft:office:2000:::chinese
cpe:/a:microsoft:office:2000:sp2Microsoft Office 2000 sp2
cpe:/a:microsoft:office:2000:sp3Microsoft Office 2000 sp3
cpe:/a:microsoft:.net_framework:1.1Microsoft .NET Framework 1.1
cpe:/a:microsoft:office:2000:sp1Microsoft Office 2000 sp1
cpe:/a:microsoft:visual_studio_.net:gold::enterprise_developer
cpe:/a:ati:catalyst_driverATI Technologies Catalyst Driver
cpe:/a:microsoft:project:2002:sp1Microsoft Project 2002 sp1
cpe:/a:microsoft:project:2003:sp1Microsoft Office Project 2003 Service Pack 1
cpe:/a:microsoft:office:xp:sp3Microsoft Office XP Service Pack 3
cpe:/a:microsoft:office:xp:sp2Microsoft Office XP sp2
cpe:/a:microsoft:visual_studio_.net:2003:goldMicrosoft Visual Studio .NET 2003 Gold
cpe:/a:microsoft:visual_studio_.net:2002:goldMicrosoft Visual Studio .NET 2002 Gold
cpe:/a:microsoft:visio:2002:sp2:professionalMicrosoft Visio 2002_sp2 professional
cpe:/a:microsoft:visio:2003::standard
cpe:/a:microsoft:visual_studio_.net:gold::trial
cpe:/a:microsoft:project:98Microsoft Project 98
cpe:/a:microsoft:project:2002Microsoft Project 2002
cpe:/a:microsoft:office:xp:sp1Microsoft Office XP sp1
cpe:/a:microsoft:project:2003Microsoft Office Project 2003
cpe:/a:microsoft:visual_studio_.net:gold::enterprise_architect
cpe:/a:microsoft:officeMicrosoft Office
cpe:/a:microsoft:project:2000Microsoft Project 2000
cpe:/a:microsoft:visual_studio_.net:2003::enterprise_architect
cpe:/a:microsoft:visual_studio_.net:gold::professional
cpe:/a:microsoft:.net_framework:1.1:sp1Microsoft .NET Framework Version 1.1 Service Pack 1
cpe:/a:microsoft:visio:2002:sp2Microsoft Visio 2002 Service Pack 2
cpe:/a:microsoft:.net_framework:1.1:sp2Microsoft .NET Framework 1.1 2003 sp2
cpe:/a:microsoft:visio:2002:sp1Microsoft Visio 2002 sp1
cpe:/a:microsoft:.net_framework:1.1:sp3Microsoft .NET Framework 1.1 SP3
cpe:/a:microsoft:visio:2003:sp1Microsoft Office Visio 2003 Service Pack 1
cpe:/a:microsoft:office:2000:::korean
cpe:/a:microsoft:visual_studio_.net:gold::academic

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:1538Win2K/XP,SP1 DDS Library Shape Control Buffer Overflow
oval:org.mitre.oval:def:1535Win2k,SP4 DDS Library Shape Control Buffer Overflow
oval:org.mitre.oval:def:1468WinXP,SP2 DDS Library Shape Control Buffer Overflow
oval:org.mitre.oval:def:1464Server 2003,SP1 DDS Library Shape Control Buffer Overflow
oval:org.mitre.oval:def:1454Server 2003 DDS Library Shape Control Buffer Overflow
oval:org.mitre.oval:def:1155WinXP,SP1 (64-bit) DDS Library Shape Control Buffer Overflow
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2127
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2127
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200508-200
(官方数据源) CNNVD

- 其它链接及资源

http://isc.sans.org/diary.php?date=2005-08-18
(VENDOR_ADVISORY)  MISC  http://isc.sans.org/diary.php?date=2005-08-18
http://securityreason.com/securityalert/72
(VENDOR_ADVISORY)  SREASON  72
http://securitytracker.com/id?1014727
(VENDOR_ADVISORY)  SECTRACK  1014727
http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf
(VENDOR_ADVISORY)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf
http://www.kb.cert.org/vuls/id/740372
(VENDOR_ADVISORY)  CERT-VN  VU#740372
http://www.kb.cert.org/vuls/id/898241
(VENDOR_ADVISORY)  CERT-VN  VU#898241
http://www.kb.cert.org/vuls/id/959049
(VENDOR_ADVISORY)  CERT-VN  VU#959049
http://www.microsoft.com/technet/security/advisory/906267.mspx
(VENDOR_ADVISORY)  MISC  http://www.microsoft.com/technet/security/advisory/906267.mspx
http://www.microsoft.com/technet/security/bulletin/ms05-052.mspx
(VENDOR_ADVISORY)  MS  MS05-052
http://www.securityfocus.com/archive/1/archive/1/470690/100/0/threaded
(UNKNOWN)  BUGTRAQ  20070606 IE 6/Microsoft Html Popup Window (mshtml.dll) DoS
http://www.securityfocus.com/bid/14594
(PATCH)  BID  14594
http://www.securityfocus.com/bid/15061
(VENDOR_ADVISORY)  BID  15061
http://www.us-cert.gov/cas/techalerts/TA05-284A.html
(VENDOR_ADVISORY)  CERT  TA05-284A
http://www.us-cert.gov/cas/techalerts/TA05-347A.html
(VENDOR_ADVISORY)  CERT  TA05-347A
http://www.us-cert.gov/cas/techalerts/TA06-220A.html
(VENDOR_ADVISORY)  CERT  TA06-220A
http://www.vupen.com/english/advisories/2005/1450
(UNKNOWN)  VUPEN  ADV-2005-1450
http://xforce.iss.net/xforce/xfdb/21895
(VENDOR_ADVISORY)  XF  Win-msdss-command-execution(21895)
http://xforce.iss.net/xforce/xfdb/34754
(VENDOR_ADVISORY)  XF  microsoft-ie-mshtml-dos(34754)

- 漏洞信息

Microsoft Visual Studio .NET 远程代码执行漏洞
高危 边界条件错误
2005-08-19 00:00:00 2005-11-02 00:00:00
远程  
        Visual Studio .NET是用于创建和集成XML Web服务和应用程序的综合开发工具。
        Microsoft Visual Studio .NET中的漏洞可能允许攻击者远程执行任意代码。目前更多信息不详。

- 公告与补丁

        目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        http://www.microsoft.com/technet/security/

- 漏洞信息 (F42292)

Technical Cyber Security Alert 2005-347A (PacketStormID:F42292)
2005-12-14 00:00:00
US-CERT  us-cert.gov
advisory,remote,denial of service,arbitrary,vulnerability
CVE-2005-1790,CVE-2005-2127
[点击下载]

Technical Cyber Security Alert TA05-347A - Microsoft has released updates that address critical vulnerabilities in Internet Explorer (IE). A remote, unauthenticated attacker could exploit these vulnerabilities to execute arbitrary code or cause a denial of service on an affected system.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


            Technical Cyber Security Alert TA05-347A

           Microsoft Internet Explorer Vulnerabilities

   Original release date: December 13, 2005
   Last revised: --
   Source: US-CERT

Systems Affected

     * Microsoft Windows
     * Microsoft Internet Explorer

   For more complete information, refer to the Microsoft Security
   Bulletin Summary for December 2005.

Overview

   Microsoft has released updates that address critical vulnerabilities
   in Internet Explorer (IE). A remote, unauthenticated attacker could
   exploit these vulnerabilities to execute arbitrary code or cause a
   denial of service on an affected system.

I. Description

   The Microsoft Security Bulletins for December 2005 address
   vulnerabilities in Microsoft Windows and Internet Explorer. By
   convincing a user to view a specially crafted HTML document, such as a
   web page or an HTML email message or attachment, an attacker could
   execute arbitrary code with the privileges of the user. The attacker
   could also cause IE or the program using the WebBrowser control to
   crash.

   Further information is available in the following US-CERT
   Vulnerability Notes:

   VU#887861 - Microsoft Internet Explorer vulnerable to code execution
   via mismatched DOM objects 

   Microsoft Internet Explorer fails to properly handle requests to
   mismatched DOM objects, which may allow a remote attacker to execute
   arbitrary code on a vulnerable system.
   (CVE-2005-1790)

   VU#959049 - Several COM objects cause memory corruption in Microsoft
   Internet Explorer 

   Microsoft Internet Explorer allows instantiation of COM objects not
   designed for use in the browser, which may allow an attacker to
   execute arbitrary code or crash IE.
   (CVE-2005-2127)

II. Impact

   A remote, unauthenticated attacker exploiting these vulnerabilities
   could execute arbitrary code with the privileges of the user. If the
   user is logged on with administrative privileges, the attacker could
   take complete control of an affected system or cause a denial of
   service.

III. Solution

Apply Updates

   Microsoft has provided the updates for these and other vulnerabilities
   in the December 2005 Security Bulletins and on the Microsoft Update
   site.

Disable ActiveX

   Disable ActiveX in the Internet Zone to further protect against the
   vulnerabilities described in VU#959049 and VU#680526. Instructions for
   disabling ActiveX are available in the CERT/CC Malicious Web Scripts
   FAQ. Note that disabling ActiveX will reduce the functionality of some
   web sites.

   The updates provided by MS05-037, MS05-038, MS05-052, and MS05-054
   block COM objects known to be vulnerable, however there may be more.

Appendix A. References

     * Microsoft Security Bulletin Summary for December 2005 -
       <http://www.microsoft.com/technet/security/bulletin/ms05-dec.mspx>

     * Microsoft Security Bulletin MS05-054 -
       <http://www.microsoft.com/technet/security/bulletin/MS05-054.mspx>

     * Microsoft Security Bulletin MS05-052 -
       <http://www.microsoft.com/technet/security/bulletin/MS05-052.mspx>

     * Microsoft Security Bulletin MS05-038 -
       <http://www.microsoft.com/technet/security/bulletin/MS05-038.mspx>

     * Microsoft Security Bulletin MS05-037 -
       <http://www.microsoft.com/technet/security/bulletin/MS05-037.mspx>

     * US-CERT Vulnerability Note VU#887861 -
       <http://www.kb.cert.org/vuls/id/887861>

     * US-CERT Vulnerability Note VU#959049 -
       <http://www.kb.cert.org/vuls/id/959049>

     * US-CERT Vulnerability Note VU#680526 -
       <http://www.kb.cert.org/vuls/id/680526>

     * CVE-2005-1790 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1790>

     * CVE-2005-2127 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2127>

     * CERT/CC Malicious Web Scripts FAQ -
       <http://www.cert.org/tech_tips/malicious_code_FAQ.html#ie56>

     * Improve the safety of your browsing and e-mail activities -
       <http://www.microsoft.com/athome/security/online/browsing_safety.m
       spx>

     * Security Essentials -
       <http://www.microsoft.com/athome/security/protect/default.aspx>

     * Microsoft Update - <https://update.microsoft.com/microsoftupdate>

     _________________________________________________________________


   The most recent version of this document can be found at:

     <http://www.us-cert.gov/cas/techalerts/TA05-347A.html> 

     _________________________________________________________________


   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <cert@cert.org> with "TA05-347A Feedback VU#887861" in the
   subject.

     _________________________________________________________________

   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>. 

     _________________________________________________________________


   Produced 2005 by US-CERT, a government organization.

   Terms of use:

     <http://www.us-cert.gov/legal.html> 

     _________________________________________________________________


   Revision History

   December 13, 2005: Initial release



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQ59LY30pj593lg50AQLb7AgAyoitGXFhQ5kbEXQwDyZLsxMnA2NTH3NA
7Xo7HqFr230p0BwzusI48XbEUg/NVN4gEQEqaaI+Rq9hYbLj6mkmgYV0O3ljZ1Xq
zIHakv0GRA71JkC/npDEGeNxIgu3L0jNjnjrBc10Sh3gKTzLamfBpljhLUPkaa8V
SCjYJA3Tq9wJy8vyB+K0ApYYtLvW3LHsQIG3c4nKu/QPfn+uVSSrOFkeQq0JckDY
9P/hrCbfmG7jz8KVAhRl7w90zAZm/uIPUO0LUhBer1WebdUsu+cX/7q4/iDh16Dq
e74OK2S3P1hESn8wo7EYc/VL09aEw8k3EIfuFYO64EuQFu0Dd6Q39g==
=omN4
-----END PGP SIGNATURE-----
    

- 漏洞信息 (F40632)

EEYEB-20050915.txt (PacketStormID:F40632)
2005-10-12 00:00:00
eEye  eeye.com
advisory,web,arbitrary
CVE-2005-2127
[点击下载]

eEye Security Advisory - eEye Digital Security has discovered a vulnerability in the way a Microsoft Design Tools COM object allocates and uses heap memory. An attacker could design a web page or HTML document that exploits the vulnerability in order to execute arbitrary code on the system of a user who views it.

MDT2DD.DLL COM Object Uninitialized Heap Memory Vulnerability

Release Date:
October 11, 2005

Date Reported:
September 15, 2005

Severity:
High (Code Execution)

Vendor:
Microsoft

Systems Affected:
Internet Explorer 5 SP4
Internet Explorer 5.5 SP2 - Windows ME
Internet Explorer 6 SP1 - All Windows Operating Systems
Internet Explorer 6 - Windows Server 2003 / Windows Server 2003 SP1
Internet Explorer 6 - Windows XP SP2

eEye ID#:  EEYEB20050915
OSVDB ID#: 2692
CVE #:  CAN-2005-2127

Overview:
eEye Digital Security has discovered a vulnerability in the way a
Microsoft Design Tools COM object allocates and uses heap memory.  An
attacker could design a web page or HTML document that exploits the
vulnerability in order to execute arbitrary code on the system of a user
who views it.

Technical Details:
The Microsoft Design Tools PolyLine Control 2 COM object (hosted in
MDT2DD.DLL) allocates memory by calling the function CCUMemMgr::Alloc
exported by MDT2FW.DLL, for the global CCUMemMgr class instance g_cumgr
which is also exported by the same.  CCUMemMgr::Alloc allocates heap
memory using HeapAlloc, and will initialize its contents to zeroes if a
flag within the class instance is set; however, in this particular case,
the flag is clear within g_cumgr, so the heap blocks allocated are not
filled with zeroes and therefore retain their prior contents.

This condition causes assumptions within MDT2DD.DLL to be violated in at
least one exploitable case. The function "ATL::CComCreator<class
ATL::CComPolyObject<class CPolyCtrl>>::CreateInstance" calls
g_cumgr.Alloc(0xA4) to allocate memory for a new class instance, but if
its subsequent initialization fails, the CPolyCtrl::~CPolyCtrl
destructor is invoked and attempts to retrieve a pointer to a function
table from offset +0x98 within the heap block.  At this point, that
field has not been initialized, so the destructor code can be made to
dereference an attacker-supplied pointer and transfer execution to an
arbitrary address.

Protection:
Retina, Network Security Scanner, has been updated to be able to
identify this vulnerability.
For more information on Retina visit: http://www.eEye.com/Retina 

Blink, Endpoint Vulnerability Prevention, already provides protection
from attacks based on this vulnerability.
For more information on Blink visit: http://www.eEye.com/Blink

Vendor Status:
Microsoft has released a patch for this vulnerability. The patch is
available at:
http://www.microsoft.com/technet/security/bulletin/MS05-052.mspx

Credit:
Fang Xing

Greetings:
Thanks Derek and eEye guys help me analyze and write the advisory,
greetz xfocus and venus-tech lab's guys.

Copyright (c) 1998-2005 eEye Digital Security Permission is hereby
granted for the redistribution of this alert electronically. It is not
to be edited in any way without express consent of eEye. If you wish to
reprint the whole or any part of this alert in any other medium
excluding electronic medium, please email alert@eEye.com for permission.

Disclaimer
The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are no warranties, implied or express, with regard to this information.
In no event shall the author be liable for any direct or indirect
damages whatsoever arising out of or in connection with the use or
spread of this information. Any use of this information is at the user's
own risk.
    

- 漏洞信息 (F40619)

Technical Cyber Security Alert 2005-284A (PacketStormID:F40619)
2005-10-12 00:00:00
US-CERT  cert.org
advisory,remote,denial of service,arbitrary,vulnerability
windows
CVE-2005-2120,CVE-2005-1987,CVE-2005-2122,CVE-2005-2128,CVE-2005-2119,CVE-2005-1978,CVE-2005-2127,CVE-2005-0163
[点击下载]

Microsoft has released updates that address critical vulnerabilities in Windows, Internet Explorer, and Exchange Server. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on an affected system.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


            Technical Cyber Security Alert TA05-284A 
  Microsoft Windows, Internet Explorer, and Exchange Server
  Vulnerabilities

   Original release date: October 11, 2005
   Last revised: --
   Source: US-CERT

Systems Affected

     * Microsoft Windows
     * Microsoft Internet Explorer
     * Microsoft Exchange Server

   For more complete information, refer to the Microsoft Security
   Bulletin Summary for October 2005.

Overview

   Microsoft has released updates that address critical vulnerabilities
   in Windows, Internet Explorer, and Exchange Server. Exploitation of
   these vulnerabilities could allow a remote, unauthenticated attacker
   to execute arbitrary code or cause a denial of service on an affected
   system.

I. Description

   Microsoft Security Bulletins for October 2005 address vulnerabilities
   in Windows and Internet Explorer. Further information is available in
   the following US-CERT Vulnerability Notes:


   VU#214572 - Microsoft Plug and Play fails to properly validate user
   supplied data 

   Microsoft Plug and Play contains a flaw in the handling of message
   buffers that may result in local or remote arbitrary code execution or
   denial-of-service conditions.
   (CAN-2005-2120)


   VU#883460 - Microsoft Collaboration Data Objects buffer overflow 

   A buffer overflow in Microsoft Collaboration Data Objects may allow a
   remote, unauthenticated attacker to execute arbitrary code on a
   vulnerable system.
   (CAN-2005-1987)


   VU#922708 - Microsoft Windows Shell fails to handle shortcut files
   properly 

   Microsoft Windows Shell does not properly handle some shortcut files
   and may permit arbitrary code execution when a specially-crafted file
   is opened.
   (CAN-2005-2122)


   VU#995220 - Microsoft DirectShow buffer overflow 

   A buffer overflow in Microsoft DirectShow may allow a remote,
   unauthenticated attacker to execute arbitrary code on a vulnerable
   system.
   (CAN-2005-2128)


   VU#180868 - Microsoft Distributed Transaction Coordinator vulnerable
   to buffer overflow via specially crafted network message 

   Microsoft Distributed Transaction Coordinator (MSDTC) may be
   vulnerable to a flaw that allows remote, unauthenticated attackers to
   execute arbitrary code.
   (CAN-2005-2119)


   VU#950516 - Microsoft COM+ contains a memory management flaw 

   Microsoft COM+ contains a vulnerability due to a memory management
   flaw that may allow an attacker to take complete control of an
   affected system.
   (CAN-2005-1978)


   VU#959049 - Several COM objects cause memory corruption in Microsoft
   Internet Explorer 

   Microsoft Internet Explorer will initialize COM objects that were not
   intended to be used in the web browser. Several COM objects have been
   identified that may allow an attacker to execute arbitrary code or
   crash Internet Explorer.
   (CAN-2005-2127)


   VU#680526 - Microsoft Internet Explorer allows non-ActiveX COM objects
   to be instantiated

   Microsoft Internet Explorer will initialize COM objects that were not
   intended to be used in the web browser. This may allow an attacker to
   execute arbitrary code or crash Internet Explorer.
   (CAN-2005-0163)

II. Impact

   Exploitation of these vulnerabilities may allow a remote,
   unauthenticated attacker to execute arbitrary code with SYSTEM
   privileges or with the privileges of the user. If the user is logged
   on with administrative privileges, the attacker could take complete
   control of an affected system. An attacker may also be able to cause a
   denial of service.

III. Solution

Apply Updates

   Microsoft has provided the updates for these vulnerabilities in the
   Security Bulletins and on the Microsoft Update site.

Workarounds

   Please see the following US-CERT Vulnerability Notes for workarounds.

Appendix A. References

     * Microsoft Security Bulletin Summary for October 2005 -
       <http://www.microsoft.com/technet/security/bulletin/ms05-oct.mspx>

     * US-CERT Vulnerability Note VU#214572 -
       <http://www.kb.cert.org/vuls/id/214572>

     * US-CERT Vulnerability Note VU#883460 -
       <http://www.kb.cert.org/vuls/id/883460>

     * US-CERT Vulnerability Note VU#922708 -
       <http://www.kb.cert.org/vuls/id/922708>

     * US-CERT Vulnerability Note VU#995220 -
       <http://www.kb.cert.org/vuls/id/995220>

     * US-CERT Vulnerability Note VU#180868 -
       <http://www.kb.cert.org/vuls/id/180868>

     * US-CERT Vulnerability Note VU#950516 -
       <http://www.kb.cert.org/vuls/id/950516>

     * US-CERT Vulnerability Note VU#959049 -
       <http://www.kb.cert.org/vuls/id/959049>

     * US-CERT Vulnerability Note VU#680526 -
       <http://www.kb.cert.org/vuls/id/680526>

     * CAN-2005-2120 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2120>

     * CAN-2005-1987 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1987>

     * CAN-2005-2122 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2122>

     * CAN-2005-2128 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2128>

     * CAN-2005-2119 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2119>

     * CAN-2005-1978 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1978>

     * CAN-2005-2127 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2127>

     * CAN-2005-0163 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0163>

     * Microsoft Update - <https://update.microsoft.com/microsoftupdate>


  _________________________________________________________________

   The most recent version of this document can be found at:

   <http://www.us-cert.gov/cas/techalerts/TA05-284A.html> 
  _________________________________________________________________

   Feedback can be directed to US-CERT.  Please send email to:
   <cert@cert.org> with "TA05-284A Feedback VU#959049" in the subject.
  _________________________________________________________________

   Revision History

   Oct 11, 2004: Initial release
  _________________________________________________________________

   Produced 2005 by US-CERT, a government organization.
  
   Terms of use

   <http://www.us-cert.gov/legal.html>
  _________________________________________________________________

   For instructions on subscribing to or unsubscribing from this 
   mailing list, visit <http://www.us-cert.gov/cas/>.





-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQ0xBVn0pj593lg50AQJvOQf/QqIy3putm/wkUAUguQaylsCfC38Lysdc
bqbtj7oF6HEoCzhQguaqQdMGOqa4QJnrObnkHN29xFhYovKWOIYkYsh6c3IXaNLK
PdImVbcMFNn9VsBNNRVr2dqPXJPvgFFzQKsDcKkknnZyxLf5mshwDJoKFsKDGr9c
1P9yxwyagQ8G73gTq6hPV/Wl/6zElXH/chlh6haXe6XN9ArTmz8A3OCAN+BZQUqe
/9T4US8oxLeLlNDcQc/PV5v3VuXXW0v9kjEjqAVEH5tRKH/oIkVdgpj7gdrAzDjM
MUojHfl1v2/JwWubQ9DFQsBx4Jxv5YvJEREsU7RbVJotn02+Yaaeog==
=5hXu
-----END PGP SIGNATURE-----
    

- 漏洞信息

19093
Microsoft Design Tools msdds.dll COM Object Arbitrary Code Execution
Remote / Network Access Input Manipulation
Loss of Integrity Upgrade
Exploit Public Vendor Verified

- 漏洞描述

A flaw exists in the Microsoft DDS Library Shape Control COM object component that allows arbitrary code execution when opening a specially crafted HTML file.

- 时间线

2005-08-17 Unknow
2005-08-17 2005-10-11

- 解决方案

Install patches for security bulletin MS05-52.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Microsoft Internet Explorer COM Object Instantiation Variant Vulnerability
Boundary Condition Error 15061
Yes No
2005-10-11 12:00:00 2009-07-12 05:07:00
Discovery is credited to Will Dormann of CERT/CC, French Security Incident Response Team (FrSIRT), Parvez Anwar of MCI, and eEye Digital Security.

- 受影响的程序版本

Nortel Networks Centrex IP Element Manager 8.0
Nortel Networks Centrex IP Element Manager 7.0
Nortel Networks Centrex IP Element Manager 2.5
Nortel Networks Centrex IP Client Manager 8.0
Nortel Networks Centrex IP Client Manager 7.0
Nortel Networks Centrex IP Client Manager 2.5
Nortel Networks Centrex IP Client Manager
Nortel Networks CallPilot 4.0
Nortel Networks CallPilot 3.0
Microsoft Internet Explorer 5.0.1 SP4
- Microsoft Windows 2000 Advanced Server SP4
- Microsoft Windows 2000 Datacenter Server SP4
- Microsoft Windows 2000 Professional SP4
- Microsoft Windows 2000 Server SP4
Microsoft Internet Explorer 5.0.1 SP3
Microsoft Internet Explorer 5.0.1 SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Terminal Services SP2
- Microsoft Windows 2000 Terminal Services SP2
- Microsoft Windows 2000 Terminal Services SP2
- Microsoft Windows 2000 Terminal Services SP1
- Microsoft Windows 2000 Terminal Services SP1
- Microsoft Windows 2000 Terminal Services SP1
- Microsoft Windows 2000 Terminal Services
- Microsoft Windows 2000 Terminal Services
- Microsoft Windows 2000 Terminal Services
- Microsoft Windows 95
- Microsoft Windows 95
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows 98
- Microsoft Windows 98
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6
- Microsoft Windows NT Enterprise Server 4.0 SP6
- Microsoft Windows NT Enterprise Server 4.0 SP6
- Microsoft Windows NT Enterprise Server 4.0 SP5
- Microsoft Windows NT Enterprise Server 4.0 SP5
- Microsoft Windows NT Enterprise Server 4.0 SP5
- Microsoft Windows NT Enterprise Server 4.0 SP4
- Microsoft Windows NT Enterprise Server 4.0 SP4
- Microsoft Windows NT Enterprise Server 4.0 SP4
- Microsoft Windows NT Enterprise Server 4.0 SP3
- Microsoft Windows NT Enterprise Server 4.0 SP3
- Microsoft Windows NT Enterprise Server 4.0 SP3
- Microsoft Windows NT Enterprise Server 4.0 SP2
- Microsoft Windows NT Enterprise Server 4.0 SP2
- Microsoft Windows NT Enterprise Server 4.0 SP2
- Microsoft Windows NT Enterprise Server 4.0 SP1
- Microsoft Windows NT Enterprise Server 4.0 SP1
- Microsoft Windows NT Enterprise Server 4.0 SP1
- Microsoft Windows NT Enterprise Server 4.0
- Microsoft Windows NT Enterprise Server 4.0
- Microsoft Windows NT Enterprise Server 4.0
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6
- Microsoft Windows NT Server 4.0 SP6
- Microsoft Windows NT Server 4.0 SP6
- Microsoft Windows NT Server 4.0 SP5
- Microsoft Windows NT Server 4.0 SP5
- Microsoft Windows NT Server 4.0 SP5
- Microsoft Windows NT Server 4.0 SP4
- Microsoft Windows NT Server 4.0 SP4
- Microsoft Windows NT Server 4.0 SP4
- Microsoft Windows NT Server 4.0 SP3
- Microsoft Windows NT Server 4.0 SP3
- Microsoft Windows NT Server 4.0 SP3
- Microsoft Windows NT Server 4.0 SP2
- Microsoft Windows NT Server 4.0 SP2
- Microsoft Windows NT Server 4.0 SP2
- Microsoft Windows NT Server 4.0 SP1
- Microsoft Windows NT Server 4.0 SP1
- Microsoft Windows NT Server 4.0 SP1
- Microsoft Windows NT Server 4.0
- Microsoft Windows NT Server 4.0
- Microsoft Windows NT Server 4.0
- Microsoft Windows NT Terminal Server 4.0 SP6a
- Microsoft Windows NT Terminal Server 4.0 SP6a
- Microsoft Windows NT Terminal Server 4.0 SP6
- Microsoft Windows NT Terminal Server 4.0 SP6
- Microsoft Windows NT Terminal Server 4.0 SP6
- Microsoft Windows NT Terminal Server 4.0 SP5
- Microsoft Windows NT Terminal Server 4.0 SP5
- Microsoft Windows NT Terminal Server 4.0 SP5
- Microsoft Windows NT Terminal Server 4.0 SP4
- Microsoft Windows NT Terminal Server 4.0 SP4
- Microsoft Windows NT Terminal Server 4.0 SP4
- Microsoft Windows NT Terminal Server 4.0 SP3
- Microsoft Windows NT Terminal Server 4.0 SP3
- Microsoft Windows NT Terminal Server 4.0 SP3
- Microsoft Windows NT Terminal Server 4.0 SP2
- Microsoft Windows NT Terminal Server 4.0 SP2
- Microsoft Windows NT Terminal Server 4.0 SP2
- Microsoft Windows NT Terminal Server 4.0 SP1
- Microsoft Windows NT Terminal Server 4.0 SP1
- Microsoft Windows NT Terminal Server 4.0 SP1
- Microsoft Windows NT Terminal Server 4.0
- Microsoft Windows NT Terminal Server 4.0
- Microsoft Windows NT Terminal Server 4.0
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows NT Workstation 4.0
Microsoft Internet Explorer 5.0.1 SP1
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Terminal Services SP2
- Microsoft Windows 2000 Terminal Services SP2
- Microsoft Windows 2000 Terminal Services SP2
- Microsoft Windows 2000 Terminal Services SP1
- Microsoft Windows 2000 Terminal Services SP1
- Microsoft Windows 2000 Terminal Services SP1
- Microsoft Windows 2000 Terminal Services
- Microsoft Windows 2000 Terminal Services
- Microsoft Windows 2000 Terminal Services
- Microsoft Windows 95
- Microsoft Windows 95
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows 98
- Microsoft Windows 98
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6
- Microsoft Windows NT Enterprise Server 4.0 SP6
- Microsoft Windows NT Enterprise Server 4.0 SP6
- Microsoft Windows NT Enterprise Server 4.0 SP5
- Microsoft Windows NT Enterprise Server 4.0 SP5
- Microsoft Windows NT Enterprise Server 4.0 SP5
- Microsoft Windows NT Enterprise Server 4.0 SP4
- Microsoft Windows NT Enterprise Server 4.0 SP4
- Microsoft Windows NT Enterprise Server 4.0 SP4
- Microsoft Windows NT Enterprise Server 4.0 SP3
- Microsoft Windows NT Enterprise Server 4.0 SP3
- Microsoft Windows NT Enterprise Server 4.0 SP3
- Microsoft Windows NT Enterprise Server 4.0 SP2
- Microsoft Windows NT Enterprise Server 4.0 SP2
- Microsoft Windows NT Enterprise Server 4.0 SP2
- Microsoft Windows NT Enterprise Server 4.0 SP1
- Microsoft Windows NT Enterprise Server 4.0 SP1
- Microsoft Windows NT Enterprise Server 4.0 SP1
- Microsoft Windows NT Enterprise Server 4.0
- Microsoft Windows NT Enterprise Server 4.0
- Microsoft Windows NT Enterprise Server 4.0
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6
- Microsoft Windows NT Server 4.0 SP6
- Microsoft Windows NT Server 4.0 SP6
- Microsoft Windows NT Server 4.0 SP5
- Microsoft Windows NT Server 4.0 SP5
- Microsoft Windows NT Server 4.0 SP5
- Microsoft Windows NT Server 4.0 SP4
- Microsoft Windows NT Server 4.0 SP4
- Microsoft Windows NT Server 4.0 SP4
- Microsoft Windows NT Server 4.0 SP3
- Microsoft Windows NT Server 4.0 SP3
- Microsoft Windows NT Server 4.0 SP3
- Microsoft Windows NT Server 4.0 SP2
- Microsoft Windows NT Server 4.0 SP2
- Microsoft Windows NT Server 4.0 SP2
- Microsoft Windows NT Server 4.0 SP1
- Microsoft Windows NT Server 4.0 SP1
- Microsoft Windows NT Server 4.0 SP1
- Microsoft Windows NT Server 4.0
- Microsoft Windows NT Server 4.0
- Microsoft Windows NT Server 4.0
- Microsoft Windows NT Terminal Server 4.0 SP6a
- Microsoft Windows NT Terminal Server 4.0 SP6a
- Microsoft Windows NT Terminal Server 4.0 SP6
- Microsoft Windows NT Terminal Server 4.0 SP6
- Microsoft Windows NT Terminal Server 4.0 SP6
- Microsoft Windows NT Terminal Server 4.0 SP5
- Microsoft Windows NT Terminal Server 4.0 SP5
- Microsoft Windows NT Terminal Server 4.0 SP5
- Microsoft Windows NT Terminal Server 4.0 SP4
- Microsoft Windows NT Terminal Server 4.0 SP4
- Microsoft Windows NT Terminal Server 4.0 SP4
- Microsoft Windows NT Terminal Server 4.0 SP3
- Microsoft Windows NT Terminal Server 4.0 SP3
- Microsoft Windows NT Terminal Server 4.0 SP3
- Microsoft Windows NT Terminal Server 4.0 SP2
- Microsoft Windows NT Terminal Server 4.0 SP2
- Microsoft Windows NT Terminal Server 4.0 SP2
- Microsoft Windows NT Terminal Server 4.0 SP1
- Microsoft Windows NT Terminal Server 4.0 SP1
- Microsoft Windows NT Terminal Server 4.0 SP1
- Microsoft Windows NT Terminal Server 4.0
- Microsoft Windows NT Terminal Server 4.0
- Microsoft Windows NT Terminal Server 4.0
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows NT Workstation 4.0
Microsoft Internet Explorer 5.0.1
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Terminal Services SP2
- Microsoft Windows 2000 Terminal Services SP2
- Microsoft Windows 2000 Terminal Services SP2
- Microsoft Windows 2000 Terminal Services SP1
- Microsoft Windows 2000 Terminal Services SP1
- Microsoft Windows 2000 Terminal Services SP1
- Microsoft Windows 2000 Terminal Services
- Microsoft Windows 2000 Terminal Services
- Microsoft Windows 2000 Terminal Services
- Microsoft Windows 95
- Microsoft Windows 95
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows 98
- Microsoft Windows 98
- Microsoft Windows 98SE
- Microsoft Windows 98SE
- Microsoft Windows 98SE
+ Microsoft Windows ME
+ Microsoft Windows ME
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6
- Microsoft Windows NT Enterprise Server 4.0 SP6
- Microsoft Windows NT Enterprise Server 4.0 SP6
- Microsoft Windows NT Enterprise Server 4.0 SP5
- Microsoft Windows NT Enterprise Server 4.0 SP5
- Microsoft Windows NT Enterprise Server 4.0 SP5
- Microsoft Windows NT Enterprise Server 4.0 SP4
- Microsoft Windows NT Enterprise Server 4.0 SP4
- Microsoft Windows NT Enterprise Server 4.0 SP4
- Microsoft Windows NT Enterprise Server 4.0 SP3
- Microsoft Windows NT Enterprise Server 4.0 SP3
- Microsoft Windows NT Enterprise Server 4.0 SP3
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6
- Microsoft Windows NT Server 4.0 SP6
- Microsoft Windows NT Server 4.0 SP6
- Microsoft Windows NT Server 4.0 SP5
- Microsoft Windows NT Server 4.0 SP5
- Microsoft Windows NT Server 4.0 SP5
- Microsoft Windows NT Server 4.0 SP4
- Microsoft Windows NT Server 4.0 SP4
- Microsoft Windows NT Server 4.0 SP4
- Microsoft Windows NT Server 4.0 SP3
- Microsoft Windows NT Server 4.0 SP3
- Microsoft Windows NT Server 4.0 SP3
- Microsoft Windows NT Terminal Server 4.0 SP6a
- Microsoft Windows NT Terminal Server 4.0 SP6a
- Microsoft Windows NT Terminal Server 4.0 SP6
- Microsoft Windows NT Terminal Server 4.0 SP6
- Microsoft Windows NT Terminal Server 4.0 SP6
- Microsoft Windows NT Terminal Server 4.0 SP5
- Microsoft Windows NT Terminal Server 4.0 SP5
- Microsoft Windows NT Terminal Server 4.0 SP5
- Microsoft Windows NT Terminal Server 4.0 SP4
- Microsoft Windows NT Terminal Server 4.0 SP4
- Microsoft Windows NT Terminal Server 4.0 SP4
- Microsoft Windows NT Terminal Server 4.0 SP3
- Microsoft Windows NT Terminal Server 4.0 SP3
- Microsoft Windows NT Terminal Server 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP3
Microsoft Internet Explorer 6.0 SP2 - do not use
Microsoft Internet Explorer 6.0 SP1
Microsoft Internet Explorer 6.0
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Terminal Services SP2
- Microsoft Windows 2000 Terminal Services SP2
- Microsoft Windows 2000 Terminal Services SP2
- Microsoft Windows 2000 Terminal Services SP1
- Microsoft Windows 2000 Terminal Services SP1
- Microsoft Windows 2000 Terminal Services SP1
- Microsoft Windows 2000 Terminal Services
- Microsoft Windows 2000 Terminal Services
- Microsoft Windows 2000 Terminal Services
- Microsoft Windows 98
- Microsoft Windows 98
- Microsoft Windows 98
- Microsoft Windows 98SE
- Microsoft Windows 98SE
- Microsoft Windows 98SE
- Microsoft Windows ME
- Microsoft Windows ME
- Microsoft Windows ME
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Terminal Server 4.0 SP6a
- Microsoft Windows NT Terminal Server 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6a
+ Microsoft Windows Server 2003 Datacenter Edition
+ Microsoft Windows Server 2003 Datacenter Edition
+ Microsoft Windows Server 2003 Datacenter Edition
+ Microsoft Windows Server 2003 Datacenter Edition Itanium 0
+ Microsoft Windows Server 2003 Datacenter Edition Itanium 0
+ Microsoft Windows Server 2003 Enterprise Edition
+ Microsoft Windows Server 2003 Enterprise Edition
+ Microsoft Windows Server 2003 Enterprise Edition
+ Microsoft Windows Server 2003 Enterprise Edition Itanium 0
+ Microsoft Windows Server 2003 Enterprise Edition Itanium 0
+ Microsoft Windows Server 2003 Enterprise Edition Itanium 0
+ Microsoft Windows Server 2003 Standard Edition
+ Microsoft Windows Server 2003 Standard Edition
+ Microsoft Windows Server 2003 Standard Edition
+ Microsoft Windows Server 2003 Web Edition
+ Microsoft Windows Server 2003 Web Edition

- 漏洞讨论

Microsoft Internet Explorer is prone to a buffer overflow vulnerability that is related to instantiation of COM objects.

Successful exploitation could let remote attackers execute arbitrary code in the context of the currently logged in user on the affected computer.

This is a variant of the vulnerability described in BID 14511 Microsoft Internet Explorer COM Object Instantiation Buffer Overflow Vulnerability. The difference between this issue and BID 14511 is that a different set of COM objects are affected that were not addressed in the previous BID.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

Microsoft has released fixes to address supported version of the software. Fixes for Internet Explorer on Windows 98/98SE/ME may be obtained through Windows Update.

Avaya has released advisory ASA-2005-214 to state which Avaya products are affected by The October 2005 release of Microsoft Windows security updates. Please see the referenced advisory for further information.

Nortel Networks has released a technical support bulletin (2005006318) regarding this and other issues for their Centrex IP Client Manager (CICM). They report the vulnerabilities will be fixed in the upcoming 2.5, 7.0 and 8.0 maintenance releases. Please see the referenced bulletin for further information.

Nortel Networks has released a technical support bulletin (2005006317) regarding this issue for CallPilot. Users are advised to contact Nortel for further information.


Microsoft Internet Explorer 6.0 SP1

Microsoft Internet Explorer 6.0 SP2 - do not use

Microsoft Internet Explorer 6.0

Microsoft Internet Explorer 5.0.1 SP4

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站