New Search

Win2K/XPSP1 DDS Library Shape Control Buffer Overflow

oval:org.mitre.oval:def:1538

Microsoft Internet Explorer 5.01 5.5 and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object and other objects including (2) Blnmgrps.dll (3) Ciodm.dll (4) Comsvcs.dll (5) Danim.dll (6) Htmlmarq.ocx (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory) (8) Mdt2qd.dll (9) Mpg4ds32.ax (10) Msadds32.ax (11) Msb1esen.dll (12) Msb1fren.dll (13) Msb1geen.dll (14) Msdtctm.dll (15) Mshtml.dll (16) Msoeacct.dll (17) Msosvfbr.dll (18) Mswcrun.dll (19) Netshell.dll (20) Ole2disp.dll (21) Outllib.dll (22) Psisdecd.dll (23) Qdvd.dll (24) Repodbc.dll (25) Shdocvw.dll (26) Shell32.dll (27) Soa.dll (28) Srchui.dll (29) Stobject.dll (30) Vdt70.dll (31) Vmhelper.dll and (32) Wbemads.dll aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows XP
  • Microsoft Windows 2000
Class:
vulnerability
Reference(s):
  • CVE-2005-2127
Product(s):
  • Microsoft Internet Explorer