This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2002-03-08
Product Commerce Server Last view 2012-08-14
Version 2007 Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:microsoft:commerce_server:2000:*:*:*:*:*:*:* 6
cpe:2.3:a:microsoft:commerce_server:2000:sp1:*:*:*:*:*:* 4
cpe:2.3:a:microsoft:commerce_server:2000:sp2:*:*:*:*:*:* 4
cpe:2.3:a:microsoft:commerce_server:2002:*:*:*:*:*:*:* 2
cpe:2.3:a:microsoft:commerce_server:2002:sp4:*:*:*:*:*:* 2
cpe:2.3:a:microsoft:commerce_server:2007:sp2:*:*:*:*:*:* 2
cpe:2.3:a:microsoft:commerce_server:2009:*:*:*:*:*:*:* 2
cpe:2.3:a:microsoft:commerce_server:2009:r2:*:*:*:*:*:* 2
cpe:2.3:a:microsoft:commerce_server:2002:sp1:*:*:*:*:*:* 1

Related : CVE

  Date Alert Description
9.3 2012-08-14 CVE-2012-1856

The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL Server 2008 SP2, SP3, R2, R2 SP1, and R2 SP2, Commerce Server 2002 SP4, Commerce Server 2007 SP2, Commerce Server 2009 Gold and R2, Host Integration Server 2004 SP1, Visual FoxPro 8.0 SP1, Visual FoxPro 9.0 SP2, and Visual Basic 6.0 Runtime allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption, aka "MSCOMCTL.OCX RCE Vulnerability."

9.3 2012-04-10 CVE-2012-0158

The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2; BizTalk Server 2002 SP1; Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and R2; Visual FoxPro 8.0 SP1 and 9.0 SP2; and Visual Basic 6.0 Runtime allow remote attackers to execute arbitrary code via a crafted (a) web site, (b) Office document, or (c) .rtf file that triggers "system state" corruption, as exploited in the wild in April 2012, aka "MSCOMCTL.OCX RCE Vulnerability."

9.3 2008-03-11 CVE-2007-1201

Unspecified vulnerability in certain COM objects in Microsoft Office Web Components 2000 allows user-assisted remote attackers to execute arbitrary code via vectors related to DataSource that trigger memory corruption, aka "Office Web Components DataSource Vulnerability."

7.5 2006-03-18 CVE-2006-1257

The sample files in the authfiles directory in Microsoft Commerce Server 2002 before SP2 allow remote attackers to bypass authentication by logging in to authfiles/login.asp with a valid username and any password, then going to the main site twice.

7.5 2002-07-03 CVE-2002-0623

Buffer overflow in AuthFilter ISAPI filter on Microsoft Commerce Server 2000 and 2002 allows remote attackers to execute arbitrary code via long authentication data, aka "New Variant of the ISAPI Filter Buffer Overrun".

7.5 2002-07-03 CVE-2002-0622

The Office Web Components (OWC) package installer for Microsoft Commerce Server 2000 allows remote attackers to execute commands by passing the commands as input to the OWC package installer, aka "OWC Package Command Execution".

5 2002-07-03 CVE-2002-0621

Buffer overflow in the Office Web Components (OWC) package installer used by Microsoft Commerce Server 2000 allows remote attackers to cause the process to fail or run arbitrary code in the LocalSystem security context via certain input to the OWC package installer.

5 2002-07-03 CVE-2002-0620

Buffer overflow in the Profile Service of Microsoft Commerce Server 2000 allows remote attackers to cause the server to fail or run arbitrary code in the LocalSystem security context via an input field using an affected API.

7.5 2002-03-08 CVE-2002-0050

Buffer overflow in AuthFilter ISAPI filter on Microsoft Commerce Server 2000 allows remote attackers to execute arbitrary code via long authentication data.

CWE : Common Weakness Enumeration

%idName
100% (3) CWE-94 Failure to Control Generation of Code ('Code Injection')

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:5327 Office Web Components DataSource Vulnerability
oval:org.mitre.oval:def:15462 MSCOMCTL.OCX RCE Vulnerability
oval:org.mitre.oval:def:15447 MSCOMCTL.OCX RCE Vulnerability - MS12-060

SAINT Exploits

Description Link
Microsoft Windows Common Controls MSCOMCTL.OCX Vulnerability More info here

Open Source Vulnerability Database (OSVDB)

id Description
42712 Microsoft Office Web Components DataSource Page Handling Arbitrary Code Execu...
24121 Microsoft Commerce Server 2002 authfiles/login.asp Authentication Bypass
14430 Microsoft Commerce Server 2000 Profile Service Affected API Overflow
5172 Microsoft Commerce Server OWC Installer LocalSystem Arbitrary Code Execution
5170 Microsoft Commerce Server OWC Installer Arbitrary Command Execution
5163 Microsoft Commerce Server AuthFilter ISAPI Filter Overflow
2049 Microsoft Commerce Server ISAPI Long Authentication Overflow

OpenVAS Exploits

id Description
2012-08-15 Name : Microsoft Windows Common Controls Remote Code Execution Vulnerability (2720573)
File : nvt/secpod_ms12-060.nasl
2012-04-11 Name : Microsoft Windows Common Controls Remote Code Execution Vulnerability (2664258)
File : nvt/secpod_ms12-027.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2012-A-0132 Microsoft Windows Common Controls Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0033659
2012-A-0059 Microsoft Windows Common Controls Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0031982
2008-A-0015 Microsoft Office Web Components Remote Code Execution Vulnerabilities
Severity: Category II - VMSKEY: V0015760

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2014-01-10 Microsoft Office Data Source Control 9.0 ActiveX clsid unicode access
RuleID : 7871 - Type : WEB-ACTIVEX - Revision : 11
2014-01-10 Microsoft Office Data Source Control 9.0 ActiveX clsid access
RuleID : 7870 - Type : BROWSER-PLUGINS - Revision : 16
2019-04-18 Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt
RuleID : 49496 - Type : FILE-OFFICE - Revision : 1
2019-04-18 Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt
RuleID : 49494 - Type : FILE-OFFICE - Revision : 1
2017-09-19 RTF obfuscation string
RuleID : 43990 - Type : INDICATOR-OBFUSCATION - Revision : 3
2017-09-19 newlines embedded in rtf header
RuleID : 43989 - Type : INDICATOR-OBFUSCATION - Revision : 3
2014-01-10 Microsoft Office 2000 and 2002 Web Components Data Source Control ActiveX cls...
RuleID : 4170 - Type : BROWSER-PLUGINS - Revision : 19
2015-01-20 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 32863 - Type : FILE-OFFICE - Revision : 4
2015-01-20 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 32862 - Type : FILE-OFFICE - Revision : 3
2015-01-20 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 32861 - Type : FILE-OFFICE - Revision : 2
2015-01-20 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 32860 - Type : FILE-OFFICE - Revision : 2
2015-01-20 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 32859 - Type : FILE-OFFICE - Revision : 2
2015-01-20 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 32858 - Type : FILE-OFFICE - Revision : 2
2015-01-20 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 32857 - Type : FILE-OFFICE - Revision : 2
2014-11-16 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 31927 - Type : FILE-OFFICE - Revision : 2
2014-11-16 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 31926 - Type : FILE-OFFICE - Revision : 2
2014-11-16 Win.Trojan.Otupsys variant outbound connection
RuleID : 31716 - Type : MALWARE-CNC - Revision : 2
2014-06-14 Shiqiang Gang malicious XLS targeted attack detection
RuleID : 30991 - Type : MALWARE-CNC - Revision : 6
2014-06-14 Shiqiang Gang malicious XLS targeted attack detection
RuleID : 30990 - Type : MALWARE-CNC - Revision : 5
2014-06-14 DNS request for known malware domain help.2012hi.hk
RuleID : 30989 - Type : BLACKLIST - Revision : 3
2014-05-01 multiple binary tags in close proximity - potentially malicious
RuleID : 30328 - Type : INDICATOR-OBFUSCATION - Revision : 3
2014-05-01 multiple binary tags in close proximity - potentially malicious
RuleID : 30327 - Type : INDICATOR-OBFUSCATION - Revision : 3
2014-04-12 Microsoft Windows common controls stack buffer overflow via malicious toolbar...
RuleID : 30166 - Type : FILE-OFFICE - Revision : 2
2014-04-12 Microsoft Windows common controls stack buffer overflow via malicious toolbar...
RuleID : 30165 - Type : FILE-OFFICE - Revision : 2
2014-04-12 Microsoft Windows common controls stack buffer overflow via malicious MSComct...
RuleID : 30164 - Type : FILE-OFFICE - Revision : 2

Nessus® Vulnerability Scanner

id Description
2012-08-15 Name: The remote Windows host has a code execution vulnerability.
File: smb_nt_ms12-060.nasl - Type: ACT_GATHER_INFO
2012-04-11 Name: The remote Windows host is affected by a remote code execution vulnerability.
File: smb_nt_ms12-027.nasl - Type: ACT_GATHER_INFO
2008-03-11 Name: Arbitrary code can be executed on the remote host through Microsoft Office We...
File: smb_nt_ms08-017.nasl - Type: ACT_GATHER_INFO
2006-04-10 Name: The remote web application may be vulnerable to an authentication bypass attack.
File: commerceserver2002_auth_bypass.nasl - Type: ACT_GATHER_INFO