This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2005-08-19
Product Visual Studio .Net Last view 2005-08-19
Version gold Type Application
Update *  
Edition *  
Language *  
Sofware Edition professional  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:microsoft:visual_studio_.net

Activity : Overall

Related : CVE

  Date Alert Description
7.5 2005-08-19 CVE-2005-2127

Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."

CWE : Common Weakness Enumeration

%idName
100% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

Open Source Vulnerability Database (OSVDB)

id Description
19093 Microsoft Design Tools msdds.dll COM Object Arbitrary Code Execution
2692 Microsoft Windows Design Tools MDT2DD.DLL COM Object Memory Corruption Comman...

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2014-01-10 Microsoft Internet Explorer WMI ASDI Extension ActiveX object access
RuleID : 4236 - Type : BROWSER-PLUGINS - Revision : 16
2014-01-10 Microsoft Internet Explorer Helper Object for Java ActiveX object access
RuleID : 4235 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer MSVTDGridCtrl7 ActiveX object access
RuleID : 4234 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer Visual Database Tools Query Designer v7.0 ActiveX...
RuleID : 4233 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer SysTray Invoker ActiveX object access
RuleID : 4232 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer SysTray ActiveX object access
RuleID : 4231 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer Search Assistant UI ActiveX object access
RuleID : 4230 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer MSAPP Export Support for Office Access ActiveX ob...
RuleID : 4229 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Windows Start Menu ActiveX object access
RuleID : 4228 - Type : BROWSER-PLUGINS - Revision : 14
2014-01-10 Microsoft Internet Explorer Network Connections ActiveX object access
RuleID : 4227 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer DocHost User Interface Handler ActiveX object access
RuleID : 4226 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer Repository ActiveX object access
RuleID : 4225 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer VideoPort ActiveX object access
RuleID : 4224 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer OpenCable Class ActiveX object access
RuleID : 4223 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer Outllib.dll ActiveX object access
RuleID : 4222 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer ProxyStub Dispatch ActiveX object access
RuleID : 4221 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Windows Network and Dial-Up Connections ActiveX object access
RuleID : 4220 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Windows Network Connections Tray ActiveX object access
RuleID : 4219 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Microsoft Windows Visual Basic WebClass ActiveX object access
RuleID : 4218 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Office Services on the Web Free/Busy ActiveX object access
RuleID : 4217 - Type : BROWSER-PLUGINS - Revision : 14
2014-01-10 Microsoft Internet Explorer CLSID_CComAcctImport ActiveX object access
RuleID : 4216 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer HTML Popup Window ActiveX object access
RuleID : 4215 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer TipGW Init ActiveX object access
RuleID : 4214 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer DDS Picture Shape Control ActiveX object access
RuleID : 4213 - Type : BROWSER-PLUGINS - Revision : 15
2014-01-10 Microsoft Internet Explorer DDS Generic Class ActiveX object access
RuleID : 4212 - Type : BROWSER-PLUGINS - Revision : 15

Nessus® Vulnerability Scanner

id Description
2005-10-11 Name: Arbitrary code can be executed on the remote host through the web client.
File: smb_nt_ms05-052.nasl - Type: ACT_GATHER_INFO