Oval Definition:oval:org.mitre.oval:def:1468
Revision Date:2011-05-16Version:46
Title:WinXP,SP2 DDS Library Shape Control Buffer Overflow
Description:Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."
Family:windowsClass:vulnerability
Status:ACCEPTEDReference(s):CVE-2005-2127
Platform(s):Microsoft Windows XP
Product(s):Microsoft Internet Explorer
Definition Synopsis
  • Windows XP 32-bit edition is installed
  • Windows XP is installed
  • AND 32-Bit version of Windows is installed
  • AND Windows XP 32 bit Service Pack 2
  • Win2K/XP/2003/Vista/2008 service pack 2 is installed
  • AND Windows XP 32-bit edition is installed
  • Windows XP is installed
  • AND 32-Bit version of Windows is installed
  • AND mshtml.dll is less than 6.0.2900.2769
  • BACK