Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2005-08-19 |
Product | Visual Studio .Net | Last view | 2005-08-19 |
Version | gold | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | professional | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:microsoft:visual_studio_.net |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.5 | 2005-08-19 | CVE-2005-2127 | Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability." |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
19093 | Microsoft Design Tools msdds.dll COM Object Arbitrary Code Execution |
2692 | Microsoft Windows Design Tools MDT2DD.DLL COM Object Memory Corruption Comman... |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Internet Explorer WMI ASDI Extension ActiveX object access RuleID : 4236 - Type : BROWSER-PLUGINS - Revision : 16 |
2014-01-10 | Microsoft Internet Explorer Helper Object for Java ActiveX object access RuleID : 4235 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer MSVTDGridCtrl7 ActiveX object access RuleID : 4234 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer Visual Database Tools Query Designer v7.0 ActiveX... RuleID : 4233 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer SysTray Invoker ActiveX object access RuleID : 4232 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer SysTray ActiveX object access RuleID : 4231 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer Search Assistant UI ActiveX object access RuleID : 4230 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer MSAPP Export Support for Office Access ActiveX ob... RuleID : 4229 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Windows Start Menu ActiveX object access RuleID : 4228 - Type : BROWSER-PLUGINS - Revision : 14 |
2014-01-10 | Microsoft Internet Explorer Network Connections ActiveX object access RuleID : 4227 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer DocHost User Interface Handler ActiveX object access RuleID : 4226 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer Repository ActiveX object access RuleID : 4225 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer VideoPort ActiveX object access RuleID : 4224 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer OpenCable Class ActiveX object access RuleID : 4223 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer Outllib.dll ActiveX object access RuleID : 4222 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer ProxyStub Dispatch ActiveX object access RuleID : 4221 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Windows Network and Dial-Up Connections ActiveX object access RuleID : 4220 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Windows Network Connections Tray ActiveX object access RuleID : 4219 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Microsoft Windows Visual Basic WebClass ActiveX object access RuleID : 4218 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Office Services on the Web Free/Busy ActiveX object access RuleID : 4217 - Type : BROWSER-PLUGINS - Revision : 14 |
2014-01-10 | Microsoft Internet Explorer CLSID_CComAcctImport ActiveX object access RuleID : 4216 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer HTML Popup Window ActiveX object access RuleID : 4215 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer TipGW Init ActiveX object access RuleID : 4214 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer DDS Picture Shape Control ActiveX object access RuleID : 4213 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer DDS Generic Class ActiveX object access RuleID : 4212 - Type : BROWSER-PLUGINS - Revision : 15 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2005-10-11 | Name: Arbitrary code can be executed on the remote host through the web client. File: smb_nt_ms05-052.nasl - Type: ACT_GATHER_INFO |