Oval Definition:oval:org.mitre.oval:def:1235
Revision Date:2014-02-24Version:44
Title:IE6,SP1 COM Object Instantiation Memory Corruption Vulnerability
Description:Internet Explorer 5.0, 5.5, and 6.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, including (1) devenum.dll, (2) diactfrm.dll, (3) wmm2filt.dll, (4) fsusd.dll, (5) dmdskmgr.dll, (6) browsewm.dll, (7) browseui.dll, (8) shell32.dll, (9) mshtml.dll, (10) inetcfg.dll, (11) infosoft.dll, (12) query.dll, (13) syncui.dll, (14) clbcatex.dll, (15) clbcatq.dll, (16) comsvcs.dll, and (17) msconf.dll, which causes memory corruption, aka "COM Object Instantiation Memory Corruption Vulnerability," a different vulnerability than CVE-2005-2087.
Family:windowsClass:vulnerability
Status:ACCEPTEDReference(s):CVE-2005-1990
Platform(s):Microsoft Windows 2000
Microsoft Windows XP
Product(s):Microsoft Internet Explorer
Definition Synopsis
  • Software section
  • Internet Explorer 6 Service Pack 1 is installed
  • AND the version of mshtml.dll is less than 6.0.2800.1515 or 6.0.2800.1516
  • the version of mshtml.dll is less than 6.0.2800.1515 (RTMGDR)
  • OR the version of mshtml.dll is less than 6.0.2800.1516 (RTMQFE)
  • AND NOT the patch kb896727 is installed
  • AND Configuration section
  • ActiveX controls and active scripting are enabled
  • current user settings are being used and ActiveX controls and active scripting are enabled
  • NOT use machine settings rather than individual user settings
  • AND ActiveX controls are enabled for the current user
  • AND active scripting is enabled for the current user
  • OR local machine settings are being used and ActiveX controls and active scripting are enabled
  • use machine settings rather than individual user settings
  • AND ActiveX controls are enabled for the local machine
  • AND active scripting is enabled for the local machine
  • BACK