Executive Summary
Summary | |
---|---|
Title | Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (936227) |
Informations | |||
---|---|---|---|
Name | MS07-042 | First vendor Publication | 2007-08-14 |
Vendor | Microsoft | Last vendor Modification | 2007-08-14 |
Severity (Vendor) | Critical | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
This critical security update resolves a privately reported vulnerability. This vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. The vulnerability could be exploited through attacks on Microsoft XML Core Services. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/ms07-042.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-190 | Integer Overflow or Wraparound (CWE/SANS Top 25) |
50 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:2069 | |||
Oval ID: | oval:org.mitre.oval:def:2069 | ||
Title: | Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution | ||
Description: | Microsoft XML Core Services (MSXML) 3.0 through 6.0 allows remote attackers to execute arbitrary code via the substringData method on a (1) TextNode or (2) XMLDOM object, which causes an integer overflow that leads to a buffer overflow. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2007-2223 | Version: | 5 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista | Product(s): | Microsoft XML Core Services |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 |
OpenVAS Exploits
Date | Description |
---|---|
2011-01-14 | Name : Microsoft XML Core Services Remote Code Execution Vulnerability (936227) File : nvt/gb_ms07-042.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
36394 | Microsoft XML Core Services (MSXML) Multiple Object Handling Overflow |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft XML substringData integer overflow attempt RuleID : 12279 - Revision : 15 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-10-30 | Name : The remote Windows host contains unsupported XML parsers. File : ms_msxml_unsupported.nasl - Type : ACT_GATHER_INFO |
2007-08-14 | Name : Arbitrary code can be executed on the remote host through the web or email cl... File : smb_nt_ms07-042.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:45:44 |
|
2014-01-19 21:30:06 |
|
2013-05-11 12:22:02 |
|