Executive Summary
Summary | |
---|---|
Title | Vulnerability in DHTML Editing Component ActiveX Control Could Allow Remote Code Execution (956844) |
Informations | |||
---|---|---|---|
Name | MS09-046 | First vendor Publication | 2009-09-08 |
Vendor | Microsoft | Last vendor Modification | 2009-12-02 |
Severity (Vendor) | Critical | Revision | 1.2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V1.2 (December 2, 2009): Added a link to Microsoft Knowledge Base Article 956844 under Known Issues in the Executive Summary.Summary: This security update resolves a privately reported vulnerability in the DHTML Editing Component ActiveX control. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS09-046.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:6271 | |||
Oval ID: | oval:org.mitre.oval:def:6271 | ||
Title: | DHTML Editing Component ActiveX Control Vulnerability | ||
Description: | The DHTML Editing Component ActiveX control in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly format HTML markup, which allows remote attackers to execute arbitrary code via a crafted web site that triggers "system state" corruption, aka "DHTML Editing Component ActiveX Control Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-2519 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 | |
Os | 3 |
OpenVAS Exploits
Date | Description |
---|---|
2009-09-10 | Name : Microsoft DHTML Editing Component ActiveX Remote Code Execution Vulnerability... File : nvt/secpod_ms09-046.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
57798 | Microsoft Windows DHTML Editing Component ActiveX Arbitrary Code Execution |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2009-09-10 | IAVM : 2009-A-0075 - Microsoft DHTML Editing Component ActiveX Remote Code Execution Vulnerability Severity : Category II - VMSKEY : V0019915 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Internet Explorer DHTML Editing ActiveX clsid access RuleID : 4148 - Revision : 23 - Type : BROWSER-PLUGINS |
2016-03-14 | Microsoft Internet Explorer DHTML Editing ActiveX clsid access RuleID : 36783 - Revision : 3 - Type : BROWSER-PLUGINS |
2016-03-14 | Microsoft Internet Explorer DHTML Editing ActiveX clsid access RuleID : 36782 - Revision : 3 - Type : BROWSER-PLUGINS |
2014-01-10 | DHTML Editing ActiveX function call unicode access RuleID : 15925 - Revision : 8 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer DHTML Editing ActiveX clsid access RuleID : 15924 - Revision : 16 - Type : BROWSER-PLUGINS |
2014-01-10 | DHTML Editing ActiveX clsid unicode access RuleID : 15923 - Revision : 8 - Type : WEB-ACTIVEX |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-09-08 | Name : Arbitrary code can be executed on the remote host through an ActiveX control. File : smb_nt_ms09-046.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:46:19 |
|
2014-01-19 21:30:22 |
|
2013-11-11 12:41:13 |
|