Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2009-2494 | First vendor Publication | 2009-08-12 |
Vendor | Cve | Last vendor Modification | 2025-01-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Active Template Library (ATL) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via vectors related to erroneous free operations after reading a variant from a stream and deleting this variant, aka "ATL Object Type Mismatch Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2494 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:5708 | |||
Oval ID: | oval:org.mitre.oval:def:5708 | ||
Title: | ATL Object Type Mismatch Vulnerability | ||
Description: | The Active Template Library (ATL) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via vectors related to erroneous free operations after reading a variant from a stream and deleting this variant, aka "ATL Object Type Mismatch Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-2494 | Version: | 16 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 | Product(s): | Microsoft Outlook Express Windows Media Player Windows ATL Component DHTML Editing Component ActiveX Control HtmlInput Object ActiveX Control |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Visual Studio Active Template Library object type mismatch vulnerability | More info here |
ExploitDB Exploits
id | Description |
---|---|
2010-04-30 | Microsoft DirectShow (msvidctl.dll) MPEG-2 Memory Corruption |
OpenVAS Exploits
Date | Description |
---|---|
2009-08-14 | Name : Vulnerabilities in Microsoft ATL Could Allow Remote Code Execution (973908) File : nvt/secpod_ms09-037.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
56910 | Microsoft Visual Studio Active Template Library (ATL) Header Mismatch Remote ... |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2009-08-13 | IAVM : 2009-A-0067 - Multiple Vulnerabilities in Microsoft Active Template Library Severity : Category II - VMSKEY : V0019882 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Video 6 ActiveX function call unicode access RuleID : 15905 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Video 6 ActiveX function call access RuleID : 15904 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Video 6 ActiveX function call RuleID : 15671 - Revision : 15 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Video 6 ActiveX clsid access RuleID : 15670 - Revision : 18 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Video 32 ActiveX clsid unicode access RuleID : 15639 - Revision : 10 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Video 32 ActiveX clsid access RuleID : 15638 - Revision : 18 - Type : BROWSER-PLUGINS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-08-11 | Name : Arbitrary code can be executed on the remote host through Microsoft Active Te... File : smb_nt_ms09-037.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-01-21 21:21:13 |
|
2024-11-28 23:10:40 |
|
2024-11-28 12:19:26 |
|
2023-12-07 21:28:05 |
|
2021-05-04 12:09:50 |
|
2021-04-22 01:10:10 |
|
2020-05-23 00:24:03 |
|
2019-02-26 17:19:32 |
|
2018-10-31 00:19:57 |
|
2018-10-13 00:22:50 |
|
2017-09-19 09:23:18 |
|
2016-09-30 01:02:07 |
|
2016-08-31 12:01:50 |
|
2016-06-28 17:46:09 |
|
2016-04-26 18:58:44 |
|
2014-02-17 10:50:49 |
|
2014-01-19 21:26:01 |
|
2013-11-11 12:38:21 |
|
2013-05-10 23:54:00 |
|