9.3
CVSSv2

CVE-2007-0024

Published: 09/01/2007 Updated: 23/07/2021
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 940
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Integer overflow in the Vector Markup Language (VML) implementation (vgx.dll) in Microsoft Internet Explorer 5.01, 6, and 7 on Windows 2000 SP4, XP SP2, Server 2003, and Server 2003 SP1 allows remote malicious users to execute arbitrary code via a crafted web page that contains unspecified integer properties that cause insufficient memory allocation and trigger a buffer overflow, aka the "VML Buffer Overrun Vulnerability."

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft internet_explorer 5.01

microsoft ie 6.0

microsoft internet_explorer 7.0

Exploits

#(c) pang0 // wwwtcbilisimorg #bug found3d by LifeAsaGeek #thx => og / chaos / sakkure / stansar / xoron #MS07-004 VML integer overflow exploit $html = "lazhtml"; print "(c) pang0 // wwwtcbilisimorg\nbug found3d by LifeAsaGeek\nMS07-004 VML integer overflow exploit\nusage: perl $0 <shell> <opt>\n", "shell => -b bind(31337)\ ...
<!-- MS07-004 VML integer overflow exploit by lifeasageek at gmailcom - Trigger CVMLRecolorinfo::InternalLoad() method you can see the screen captured image "picasawebgooglecom/lifeasageek/MS07004/photo?pli=1#5019163989136880322" which is generated by DarunGrim - tested on WinXP SP2 Korean version( fully patched except kb929969) ...