Executive Summary

Informations
Name CVE-2007-0675 First vendor Publication 2007-02-02
Vendor Cve Last vendor Modification 2018-10-12

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.6 Attack Range Network
Cvss Impact Score 10 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A certain ActiveX control in sapi.dll (aka the Speech API) in Speech Components in Microsoft Windows Vista, when the Speech Recognition feature is enabled, allows user-assisted remote attackers to delete arbitrary files, and conduct other unauthorized activities, via a web page with an embedded sound object that contains voice commands to an enabled microphone, allowing for interaction with Windows Explorer.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0675

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-94 Failure to Control Generation of Code ('Code Injection')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:5489
 
Oval ID: oval:org.mitre.oval:def:5489
Title: Speech API Vulnerability
Description: A certain ActiveX control in sapi.dll (aka the Speech API) in Speech Components in Microsoft Windows Vista, when the Speech Recognition feature is enabled, allows user-assisted remote attackers to delete arbitrary files, and conduct other unauthorized activities, via a web page with an embedded sound object that contains voice commands to an enabled microphone, allowing for interaction with Windows Explorer.
Family: windows Class: vulnerability
Reference(s): CVE-2007-0675
Version: 4
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1

OpenVAS Exploits

Date Description
2011-01-10 Name : Microsoft Windows Speech Components Voice Recognition Command Execution Vulne...
File : nvt/gb_ms08-032.nasl
2008-09-30 Name : Bluetooth Stack Could Allow Remote Code Execution Vulnerability (951376)
File : nvt/gb_ms08-030.nasl
2008-09-30 Name : Vulnerabilities in DirectX Could Allow Remote Code Execution (951698)
File : nvt/gb_ms08-033.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
46062 Microsoft Windows Speech Components (sapi.dll) Speech Recognition Code Execution

33627 Microsoft Vista Speech Recognition Web Page Arbitrary Command Execution

Snort® IPS/IDS

Date Description
2016-03-14 Microsoft Internet Explorer sapi.dll ActiveX clsid access attempt
RuleID : 36434 - Revision : 2 - Type : BROWSER-PLUGINS
2016-03-14 Microsoft Internet Explorer sapi.dll ActiveX clsid access attempt
RuleID : 36433 - Revision : 2 - Type : BROWSER-PLUGINS
2014-01-10 backweb ActiveX clsid unicode access
RuleID : 13833 - Revision : 7 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer backweb ActiveX clsid access
RuleID : 13832 - Revision : 11 - Type : BROWSER-PLUGINS
2014-01-10 sapi.dll alternate killbit ActiveX clsid unicode access
RuleID : 13831 - Revision : 7 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer sapi.dll ActiveX clsid access attempt
RuleID : 13830 - Revision : 12 - Type : BROWSER-PLUGINS
2014-01-10 sapi.dll ActiveX clsid unicode access
RuleID : 13829 - Revision : 7 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Internet Explorer sapi.dll ActiveX clsid access attempt
RuleID : 13828 - Revision : 12 - Type : BROWSER-PLUGINS

Nessus® Vulnerability Scanner

Date Description
2008-06-10 Name : The remote Windows host has an ActiveX control that is affected by multiple m...
File : smb_nt_ms08-032.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/22359
CERT http://www.us-cert.gov/cas/techalerts/TA08-162B.html
HP http://marc.info/?l=bugtraq&m=121380194923597&w=2
MISC http://blogs.technet.com/msrc/archive/2007/01/31/issue-regarding-windows-vist...
MLIST http://lists.immunitysec.com/pipermail/dailydave/2007-January/004003.html
http://lists.immunitysec.com/pipermail/dailydave/2007-January/004005.html
http://lists.immunitysec.com/pipermail/dailydave/2007-January/004007.html
http://lists.immunitysec.com/pipermail/dailydave/2007-January/004012.html
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08...
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
SECTRACK http://www.securitytracker.com/id?1020232
SECUNIA http://secunia.com/advisories/30578
VUPEN http://www.vupen.com/english/advisories/2008/1779/references

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2021-05-04 12:05:20
  • Multiple Updates
2021-04-22 01:05:54
  • Multiple Updates
2020-05-23 00:19:13
  • Multiple Updates
2018-10-13 00:22:36
  • Multiple Updates
2017-10-11 09:23:50
  • Multiple Updates
2016-04-26 15:43:15
  • Multiple Updates
2014-02-17 10:38:55
  • Multiple Updates
2014-01-19 21:23:52
  • Multiple Updates
2013-05-11 10:18:47
  • Multiple Updates