Executive Summary

Informations
Name MS07-009 First vendor Publication 2007-02-13
Vendor Microsoft Last vendor Modification 2007-02-13
Severity (Vendor) Critical Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A remote code execution vulnerability exists in the ADODB.Connection ActiveX control that is provided as part of the ActiveX Data Objects (ADO) and that is distributed in MDAC. An attacker who successfully exploited this vulnerability could take complete control of an affected system.

Original Source

Url : http://www.microsoft.com/technet/security/bulletin/ms07-009.mspx?pubDate=2 (...)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:214
 
Oval ID: oval:org.mitre.oval:def:214
Title: Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution
Description: The Execute method in the ADODB.Connection 2.7 and 2.8 ActiveX control objects (ADODB.Connection.2.7 and ADODB.Connection.2.8) in the Microsoft Data Access Components (MDAC) 2.5 SP3, 2.7 SP1, 2.8, and 2.8 SP1 does not properly track freed memory when the second argument is a BSTR, which allows remote attackers to cause a denial of service (Internet Explorer crash) and possibly execute arbitrary code via certain strings in the second and third arguments.
Family: windows Class: vulnerability
Reference(s): CVE-2006-5559
Version: 4
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 4

ExploitDB Exploits

id Description
2007-03-26 MS Internet Explorer - Recordset Double Free Memory Exploit (MS07-009)

Open Source Vulnerability Database (OSVDB)

Id Description
31882 Microsoft MDAC ADODB.Connection ActiveX Control Execute Method Remote Code Ex...

Data Access Components (DAC) contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered when the 'Execute' method frees memory in a way that circumvents the script interpreter's memory manager. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity.

Information Assurance Vulnerability Management (IAVM)

Date Description
2007-02-16 IAVM : 2007-A-0015 - Microsoft Internet Explorer ADODB.Connection Execute Memory Corruption Vulner...
Severity : Category I - VMSKEY : V0013598

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Windows ADODB.Connection ActiveX function call access
RuleID : 9640 - Revision : 16 - Type : BROWSER-PLUGINS
2014-01-10 ADODB.Recordset ActiveX CLSID unicode access
RuleID : 7869 - Revision : 7 - Type : WEB-ACTIVEX
2014-01-10 ADODB.Recordset ActiveX clsid access
RuleID : 7868 - Revision : 13 - Type : BROWSER-PLUGINS
2014-01-10 ADODB.Connection ActiveX clsid unicode access
RuleID : 7867 - Revision : 8 - Type : WEB-ACTIVEX
2014-01-10 ADODB.Connection ActiveX clsid access
RuleID : 7866 - Revision : 18 - Type : BROWSER-PLUGINS
2014-01-10 ADODB.Recordset ActiveX function call access
RuleID : 7003 - Revision : 14 - Type : BROWSER-PLUGINS

Nessus® Vulnerability Scanner

Date Description
2007-02-13 Name : Arbitrary code can be executed on the remote host through the web client.
File : smb_nt_ms07-009.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2014-02-17 11:45:36
  • Multiple Updates
2014-01-19 21:30:03
  • Multiple Updates
2013-11-11 12:41:04
  • Multiple Updates
2013-05-11 12:21:58
  • Multiple Updates