Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2011-10-11 |
Product | Host Integration Server | Last view | 2023-11-14 |
Version | 2006 | Type | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8.8 | 2023-11-14 | CVE-2023-38151 | Microsoft Host Integration Server 2020 Remote Code Execution Vulnerability |
9.3 | 2012-08-14 | CVE-2012-1856 | The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL Server 2008 SP2, SP3, R2, R2 SP1, and R2 SP2, Commerce Server 2002 SP4, Commerce Server 2007 SP2, Commerce Server 2009 Gold and R2, Host Integration Server 2004 SP1, Visual FoxPro 8.0 SP1, Visual FoxPro 9.0 SP2, and Visual Basic 6.0 Runtime allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption, aka "MSCOMCTL.OCX RCE Vulnerability." |
5 | 2011-10-11 | CVE-2011-2008 | Microsoft Host Integration Server (HIS) 2004 SP1, 2006 SP1, 2009, and 2010 allows remote attackers to cause a denial of service (SNA Server service outage) via crafted TCP or UDP traffic, aka "Access of Unallocated Memory DoS Vulnerability." |
5 | 2011-10-11 | CVE-2011-2007 | Microsoft Host Integration Server (HIS) 2004 SP1, 2006 SP1, 2009, and 2010 allows remote attackers to cause a denial of service (SNA Server service outage) via crafted TCP or UDP traffic, aka "Endless Loop DoS in snabase.exe Vulnerability." |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
66% (2) | CWE-20 | Improper Input Validation |
33% (1) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:13040 | Endless Loop DoS in snabase.exe Vulnerability |
oval:org.mitre.oval:def:12915 | Access of Unallocated Memory DoS Vulnerability |
oval:org.mitre.oval:def:15447 | MSCOMCTL.OCX RCE Vulnerability - MS12-060 |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
76224 | Microsoft Host Integration Server Multiple Process Request Parsing Remote Mem... |
76223 | Microsoft Host Integration Server Multiple Process Request Parsing Infinite L... |
OpenVAS Exploits
id | Description |
---|---|
2012-08-15 | Name : Microsoft Windows Common Controls Remote Code Execution Vulnerability (2720573) File : nvt/secpod_ms12-060.nasl |
2011-10-12 | Name : Microsoft Host Integration Server Denial of Service Vulnerabilities (2607670) File : nvt/secpod_ms11-082.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2012-A-0132 | Microsoft Windows Common Controls Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0033659 |
2011-B-0127 | Multiple Denial of Service Vulnerabilities in Microsoft Host Integration Server Severity: Category II - VMSKEY: V0030411 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-04-18 | Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt RuleID : 49496 - Type : FILE-OFFICE - Revision : 1 |
2019-04-18 | Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt RuleID : 49494 - Type : FILE-OFFICE - Revision : 1 |
2014-01-10 | Microsoft Office MSComctlLib.Toolbar ActiveX control exploit attempt RuleID : 26832 - Type : FILE-OFFICE - Revision : 5 |
2014-01-10 | Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt RuleID : 24006 - Type : FILE-OFFICE - Revision : 14 |
2014-01-10 | Microsoft Office MSCOMCTL ActiveX control tabstrip method arbitrary code exec... RuleID : 23845 - Type : FILE-MULTIMEDIA - Revision : 8 |
2014-01-10 | Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt RuleID : 23844 - Type : FILE-OFFICE - Revision : 14 |
2014-01-10 | Microsoft Windows Host Integration Server SNA length dos attempt RuleID : 20271 - Type : OS-WINDOWS - Revision : 5 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2012-08-15 | Name: The remote Windows host has a code execution vulnerability. File: smb_nt_ms12-060.nasl - Type: ACT_GATHER_INFO |
2011-10-11 | Name: The Host Integration Server (HIS) installed on the remote host has multiple d... File: smb_nt_ms11-082.nasl - Type: ACT_GATHER_INFO |