9.3
CVSSv2

CVE-2009-0901

Published: 29/07/2009 Updated: 12/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2; does not prevent VariantClear calls on an uninitialized VARIANT, which allows remote malicious users to execute arbitrary code via a malformed stream to an ATL (1) component or (2) control, related to ATL headers and error handling, aka "ATL Uninitialized Object Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft visual studio 2008

microsoft visual studio .net 2003

microsoft visual studio 2005

microsoft visual c\\+\\+ 2008

microsoft visual c\\+\\+ 2005

References

CWE-94http://www.securityfocus.com/bid/35832http://www.adobe.com/support/security/bulletins/apsb09-11.htmlhttp://www.adobe.com/support/security/advisories/apsa09-04.htmlhttp://www.vupen.com/english/advisories/2009/2034http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspxhttp://www.vupen.com/english/advisories/2009/2232http://secunia.com/advisories/36187http://www.adobe.com/support/security/bulletins/apsb09-13.htmlhttp://secunia.com/advisories/36374http://sunsolve.sun.com/search/document.do?assetkey=1-66-266108-1http://www.adobe.com/support/security/bulletins/apsb09-10.htmlhttp://www.us-cert.gov/cas/techalerts/TA09-195A.htmlhttp://www.us-cert.gov/cas/techalerts/TA09-223A.htmlhttp://www.us-cert.gov/cas/techalerts/TA09-286A.htmlhttp://marc.info/?l=bugtraq&m=126592505426855&w=2http://www.novell.com/support/viewContent.do?externalId=7004997&sliceId=1http://secunia.com/advisories/36746http://secunia.com/advisories/35967https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7581https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6373https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6311https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6289https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-060https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-035https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/456745