This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2002-03-08
Product Xml Core Services Last view 2016-04-12
Version 5 Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:microsoft:xml_core_services:3.0:*:*:*:*:*:*:* 16
cpe:2.3:a:microsoft:xml_core_services:6.0:*:*:*:*:*:*:* 10
cpe:2.3:a:microsoft:xml_core_services:4.0:*:*:*:*:*:*:* 9
cpe:2.3:a:microsoft:xml_core_services:5.0:*:*:*:*:*:*:* 8
cpe:2.3:a:microsoft:xml_core_services:2.6:*:*:*:*:*:*:* 1
cpe:2.3:a:microsoft:xml_core_services:*:*:*:*:*:*:*:* 1

Related : CVE

  Date Alert Description
8.8 2016-04-12 CVE-2016-0147

Microsoft XML Core Services 3.0 allows remote attackers to execute arbitrary code via a crafted web site, aka "MSXML 3.0 Remote Code Execution Vulnerability."

4.3 2015-08-14 CVE-2015-2471

Microsoft XML Core Services 3.0, 5.0, and 6.0 supports SSL 2.0, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and conducting a decryption attack, aka "MSXML Information Disclosure Vulnerability," a different vulnerability than CVE-2015-2434.

4.3 2015-08-14 CVE-2015-2440

Microsoft XML Core Services 3.0, 5.0, and 6.0 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "MSXML Information Disclosure Vulnerability."

4.3 2015-08-14 CVE-2015-2434

Microsoft XML Core Services 3.0 and 5.0 supports SSL 2.0, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and conducting a decryption attack, aka "MSXML Information Disclosure Vulnerability," a different vulnerability than CVE-2015-2471.

4.3 2015-04-14 CVE-2015-1646

Microsoft XML Core Services (aka MSXML) 3.0 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted DTD, aka "MSXML3 Same Origin Policy SFB Vulnerability."

4.3 2014-06-11 CVE-2014-1816

Microsoft XML Core Services (aka MSXML) 3.0 and 6.0 does not properly restrict the information transmitted by Internet Explorer during a download action, which allows remote attackers to discover (1) full pathnames on the client system and (2) local usernames embedded in these pathnames via a crafted web site, aka "MSXML Entity URI Vulnerability."

9.3 2013-01-09 CVE-2013-0007

Microsoft XML Core Services (aka MSXML) 4.0, 5.0, and 6.0 does not properly parse XML content, which allows remote attackers to execute arbitrary code via a crafted web page, aka "MSXML XSLT Vulnerability."

9.3 2013-01-09 CVE-2013-0006

Microsoft XML Core Services (aka MSXML) 3.0, 5.0, and 6.0 does not properly parse XML content, which allows remote attackers to execute arbitrary code via a crafted web page, aka "MSXML Integer Truncation Vulnerability."

9.3 2012-06-13 CVE-2012-1889

Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.

9.3 2010-08-11 CVE-2010-2561

Microsoft XML Core Services (aka MSXML) 3.0 does not properly handle HTTP responses, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted response, aka "Msxml2.XMLHTTP.3.0 Response Handling Memory Corruption Vulnerability."

5 2009-02-04 CVE-2009-0419

Microsoft XML Core Services, as used in Microsoft Expression Web, Office, Internet Explorer 6 and 7, and other products, does not properly restrict access from web pages to Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-4033.

4.3 2008-11-12 CVE-2008-4033

Cross-domain vulnerability in Microsoft XML Core Services 3.0 through 6.0, as used in Microsoft Expression Web, Office, Internet Explorer, and other products, allows remote attackers to obtain sensitive information from another domain and corrupt the session state via HTTP request header fields, as demonstrated by the Transfer-Encoding field, aka "MSXML Header Request Vulnerability."

9.3 2007-08-14 CVE-2007-2223

Microsoft XML Core Services (MSXML) 3.0 through 6.0 allows remote attackers to execute arbitrary code via the substringData method on a (1) TextNode or (2) XMLDOM object, which causes an integer overflow that leads to a buffer overflow.

9.3 2007-01-08 CVE-2007-0099

Race condition in the msxml3 module in Microsoft XML Core Services 3.0, as used in Internet Explorer 6 and other applications, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via many nested tags in an XML document in an IFRAME, when synchronous document rendering is frequently disrupted with asynchronous events, as demonstrated using a JavaScript timer, which can trigger NULL pointer dereferences or memory corruption, aka "MSXML Memory Corruption Vulnerability."

7.6 2006-11-06 CVE-2006-5745

Unspecified vulnerability in the setRequestHeader method in the XMLHTTP (XML HTTP) ActiveX Control 4.0 in Microsoft XML Core Services 4.0 on Windows, when accessed by Internet Explorer, allows remote attackers to execute arbitrary code via crafted arguments that lead to memory corruption, a different vulnerability than CVE-2006-4685. NOTE: some of these details are obtained from third party information.

7.5 2006-10-10 CVE-2006-4686

Buffer overflow in the Extensible Stylesheet Language Transformations (XSLT) processing in Microsoft XML Parser 2.6 and XML Core Services 3.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted Web page.

2.6 2006-10-10 CVE-2006-4685

The XMLHTTP ActiveX control in Microsoft XML Parser 2.6 and XML Core Services 3.0 through 6.0 does not properly handle HTTP server-side redirects, which allows remote user-assisted attackers to access content from other domains.

5 2002-03-08 CVE-2002-0057

XMLHTTP control in Microsoft XML Core Services 2.6 and later does not properly handle IE Security Zone settings, which allows remote attackers to read arbitrary files by specifying a local file as an XML Data Source.

CWE : Common Weakness Enumeration

%idName
18% (3) CWE-264 Permissions, Privileges, and Access Controls
18% (3) CWE-200 Information Exposure
12% (2) CWE-310 Cryptographic Issues
12% (2) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
12% (2) CWE-94 Failure to Control Generation of Code ('Code Injection')
6% (1) CWE-362 Race Condition
6% (1) CWE-190 Integer Overflow or Wraparound
6% (1) CWE-189 Numeric Errors
6% (1) CWE-20 Improper Input Validation

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:221 Microsoft XML Core Services Vulnerability
oval:org.mitre.oval:def:285 XSLT Buffer Overrun Vulnerability
oval:org.mitre.oval:def:104 Microsoft XML Core Services Vulnerability
oval:org.mitre.oval:def:5793 MSXML Memory Corruption Vulnerability
oval:org.mitre.oval:def:2069 Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution
oval:org.mitre.oval:def:5847 MSXML Header Request Vulnerability
oval:org.mitre.oval:def:11730 Msxml2.XMLHTTP.3.0 Response Handling Memory Corruption Vulnerability
oval:org.mitre.oval:def:15195 MSXML Uninitialized Memory Corruption Vulnerability - MS12-043
oval:org.mitre.oval:def:16429 MSXML Integer Truncation Vulnerability - MS13-002
oval:org.mitre.oval:def:15458 MSXML XSLT Vulnerability - MS13-002
oval:org.mitre.oval:def:24963 Vulnerability in Microsoft XML Core Services could allow information disclosu...
oval:org.mitre.oval:def:29009 MSXML3 same origin policy SFB vulnerability - CVE-2015-1646 (MS15-039)

SAINT Exploits

Description Link
Microsoft XMLHTTP ActiveX control setRequestHeader vulnerability More info here
Microsoft XML Core Services memory corruption More info here

Open Source Vulnerability Database (OSVDB)

id Description
66973 Microsoft XML Core Services Msxml2.XMLHTTP.3.0 ActiveX HTTP Response Handling...
56438 Microsoft XML Core Services Set-Cookie HTTP Response Header Restriction Weakness
50279 Microsoft XML Core Services HTTP Request Header Field Cross-domain Session St...
36394 Microsoft XML Core Services (MSXML) Multiple Object Handling Overflow
32627 Microsoft IE msxml3 Module Nested Tag Race Condition DoS
30208 Microsoft XMLHTTP ActiveX Control setRequestHeader Method Arbitrary Code Exec...
29426 Microsoft XML Core Services XSLT Processing Overflow
29425 Microsoft XML Core Services XMLHTTP ActiveX Control Server-side Redirect Info...
3032 Microsoft IE XMLHTTP Control Arbitrary Remote File Access

OpenVAS Exploits

id Description
2012-06-14 Name : Microsoft XML Core Services Remote Code Execution Vulnerability (2719615)
File : nvt/gb_ms_xml_core_services_code_exec_vuln.nasl
2011-01-14 Name : Microsoft XML Core Services Remote Code Execution Vulnerability (936227)
File : nvt/gb_ms07-042.nasl
2010-08-11 Name : Microsoft Windows LSASS Denial of Service Vulnerability (975467)
File : nvt/secpod_ms10-051.nasl
2009-02-18 Name : Microsoft XML Core Service Information Disclosure Vulnerability
File : nvt/secpod_ms_xml_core_svc_info_disc_vuln.nasl
2008-11-12 Name : Microsoft XML Core Services Remote Code Execution Vulnerability (955218)
File : nvt/secpod_ms08-069_900058.nasl
2005-11-03 Name : XML Core Services patch (Q318203)
File : nvt/smb_nt_ms02-008.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2015-B-0098 Multiple Vulnerabilities in Microsoft XML Core Services (MS15-084)
Severity: Category II - VMSKEY: V0061289
2014-B-0075 Microsoft XML Core Services Information Disclosure Vulnerability
Severity: Category I - VMSKEY: V0052481
2013-A-0004 Multiple Vulnerabilities in Microsoft XML Core Services
Severity: Category I - VMSKEY: V0036444
2008-A-0084 Multiple Vulnerabilities in Microsoft XML Core Services
Severity: Category II - VMSKEY: V0017877

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2014-01-10 XMLHTTP 4.0 ActiveX clsid unicode access
RuleID : 8728 - Type : WEB-ACTIVEX - Revision : 8
2014-01-10 Microsoft Internet Explorer XMLHTTP 4.0 ActiveX clsid access
RuleID : 8727 - Type : BROWSER-PLUGINS - Revision : 17
2014-01-10 ActiveX clsid unicode access
RuleID : 8406 - Type : WEB-ACTIVEX - Revision : 7
2014-01-10 Microsoft Internet Explorer ActiveX clsid access
RuleID : 8405 - Type : BROWSER-PLUGINS - Revision : 13
2019-09-17 Microsoft XML core services cross-domain information disclosure attempt
RuleID : 51038 - Type : BROWSER-IE - Revision : 1
2019-05-24 Microsoft Internet Explorer MSXML .definition ActiveX clsid access attempt
RuleID : 49932 - Type : BROWSER-PLUGINS - Revision : 1
2019-05-24 Microsoft Internet Explorer MSXML .definition ActiveX clsid access attempt
RuleID : 49931 - Type : BROWSER-PLUGINS - Revision : 1
2019-05-24 Microsoft Internet Explorer MSXML .definition ActiveX clsid access attempt
RuleID : 49930 - Type : BROWSER-PLUGINS - Revision : 1
2019-05-24 Microsoft Internet Explorer MSXML .definition ActiveX clsid access attempt
RuleID : 49929 - Type : BROWSER-PLUGINS - Revision : 1
2016-05-12 Microsoft XML Core Services ActiveX control use after free attempt
RuleID : 38464 - Type : BROWSER-PLUGINS - Revision : 2
2016-05-12 Microsoft XML Core Services ActiveX control use after free attempt
RuleID : 38463 - Type : BROWSER-PLUGINS - Revision : 2
2015-05-14 Multiple products external entity injection attempt
RuleID : 34098 - Type : FILE-OTHER - Revision : 6
2015-05-14 Multiple products external entity injection attempt
RuleID : 34097 - Type : FILE-OTHER - Revision : 6
2015-04-14 Microsoft XML Core Services MIME Viewer memory corruption attempt
RuleID : 33829 - Type : OS-WINDOWS - Revision : 2
2015-04-14 Microsoft XML Core Services MIME Viewer memory corruption attempt
RuleID : 33828 - Type : OS-WINDOWS - Revision : 2
2015-04-14 Microsoft XML Core Services MIME Viewer memory corruption attempt
RuleID : 33827 - Type : OS-WINDOWS - Revision : 2
2014-01-10 overly large XML file MSXML heap overflow attempt
RuleID : 28286 - Type : FILE-OTHER - Revision : 3
2014-01-10 Multiple exploit kit Payload detection - readme.dll
RuleID : 27898 - Type : EXPLOIT-KIT - Revision : 2
2014-01-10 Multiple exploit kit Payload detection - calc.dll
RuleID : 27897 - Type : EXPLOIT-KIT - Revision : 2
2014-01-10 Multiple exploit kit Payload detection - contacts.dll
RuleID : 27896 - Type : EXPLOIT-KIT - Revision : 2
2014-01-10 Multiple exploit kit Payload detection - info.dll
RuleID : 27895 - Type : EXPLOIT-KIT - Revision : 2
2014-01-10 Multiple exploit kit Payload detection - about.dll
RuleID : 27894 - Type : EXPLOIT-KIT - Revision : 2
2014-01-10 Blackholev2/Darkleech exploit kit landing page request
RuleID : 27865-community - Type : EXPLOIT-KIT - Revision : 7
2014-01-10 Blackholev2/Darkleech exploit kit landing page request
RuleID : 27865 - Type : EXPLOIT-KIT - Revision : 7
2014-01-10 Gong Da exploit kit possible jar download
RuleID : 27706 - Type : EXPLOIT-KIT - Revision : 3

Nessus® Vulnerability Scanner

id Description
2016-04-12 Name: The remote host is affected by a remote code execution vulnerability.
File: smb_nt_ms16-040.nasl - Type: ACT_GATHER_INFO
2015-08-11 Name: The remote host is affected by multiple information disclosure vulnerabilities.
File: smb_nt_ms15-084.nasl - Type: ACT_GATHER_INFO
2015-04-14 Name: The remote host is affected by a security bypass vulnerability.
File: smb_nt_ms15-039.nasl - Type: ACT_GATHER_INFO
2014-06-11 Name: The remote host is affected by an information disclosure vulnerability.
File: smb_nt_ms14-033.nasl - Type: ACT_GATHER_INFO
2013-01-09 Name: Arbitrary code can be executed on the remote host through Microsoft XML Core ...
File: smb_nt_ms13-002.nasl - Type: ACT_GATHER_INFO
2012-07-11 Name: Arbitrary code can be executed on the remote host through Microsoft XML Core ...
File: smb_nt_ms12-043.nasl - Type: ACT_GATHER_INFO
2010-08-11 Name: Arbitrary code can be executed on the remote host through its Microsoft XML C...
File: smb_nt_ms10-051.nasl - Type: ACT_GATHER_INFO
2008-11-12 Name: Arbitrary code can be executed on the remote host through the web or email cl...
File: smb_nt_ms08-069.nasl - Type: ACT_GATHER_INFO
2007-08-14 Name: Arbitrary code can be executed on the remote host through the web or email cl...
File: smb_nt_ms07-042.nasl - Type: ACT_GATHER_INFO
2006-11-14 Name: Arbitrary code can be executed on the remote host through the web or email cl...
File: smb_nt_ms06-071.nasl - Type: ACT_GATHER_INFO
2006-10-10 Name: Arbitrary code can be executed on the remote host through the web or email cl...
File: smb_nt_ms06-061.nasl - Type: ACT_GATHER_INFO
2002-02-24 Name: Local files can be retrieved through the web client.
File: smb_nt_ms02-008.nasl - Type: ACT_GATHER_INFO
2002-02-13 Name: Arbitrary code can be executed on the remote host through the web client.
File: smb_nt_ms02-005.nasl - Type: ACT_GATHER_INFO