7.5
CVSSv2

CVE-2005-2127

Published: 19/08/2005 Updated: 19/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft office 2000

microsoft office xp

microsoft project 98

microsoft visio 2002

microsoft visio 2003

microsoft visual studio .net 2002

microsoft visual studio .net gold

microsoft .net framework 1.1

microsoft project 2002

microsoft project 2003

microsoft office

microsoft visio 2000

ati catalyst driver

microsoft project 2000

microsoft visual studio .net 2003

Exploits

source: wwwsecurityfocuscom/bid/14594/info Microsoft Visual Studio NET is prone to a vulnerability that could allow remote arbitrary code execution This is due to a buffer overflow that is exposed during COM object instantiation The list of vulnerable packages has been updated to include applications suspected of installing the vulner ...

Github Repositories

Phân tích tấn công mạng từ file PCAP I Tools WireShark Scdbg II Phân tích XEM TÓM TẮT TẠI ĐÂY 1 Xác định các địa chỉ IP và protocol cần phân tích Đầu tiên, em sẽ xem có bao nhiêu IP được capture trong file PCAP này, sử dụng option Sta

References

CWE-119http://www.microsoft.com/technet/security/advisory/906267.mspxhttp://www.securityfocus.com/bid/14594http://securitytracker.com/id?1014727http://secunia.com/advisories/16480http://www.kb.cert.org/vuls/id/740372http://isc.sans.org/diary.php?date=2005-08-18http://www.us-cert.gov/cas/techalerts/TA05-284A.htmlhttp://www.kb.cert.org/vuls/id/959049http://www.kb.cert.org/vuls/id/898241http://www.us-cert.gov/cas/techalerts/TA05-347A.htmlhttp://www.securityfocus.com/bid/15061http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdfhttp://secunia.com/advisories/17172http://secunia.com/advisories/17223http://secunia.com/advisories/17509http://www.us-cert.gov/cas/techalerts/TA06-220A.htmlhttp://securityreason.com/securityalert/72http://www.vupen.com/english/advisories/2005/1450https://exchange.xforce.ibmcloud.com/vulnerabilities/34754https://exchange.xforce.ibmcloud.com/vulnerabilities/21895https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1538https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1535https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1468https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1464https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1454https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1155https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-052http://www.securityfocus.com/archive/1/470690/100/0/threadedhttps://nvd.nist.govhttps://github.com/FloRRenn/Network-Attack-Analyze-via-WireSharkhttps://www.exploit-db.com/exploits/26167/https://www.kb.cert.org/vuls/id/740372