Oval Definition:oval:org.mitre.oval:def:1538
Revision Date:2011-05-16Version:45
Title:Win2K/XP,SP1 DDS Library Shape Control Buffer Overflow
Description:Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."
Family:windowsClass:vulnerability
Status:ACCEPTEDReference(s):CVE-2005-2127
Platform(s):Microsoft Windows 2000
Microsoft Windows XP
Product(s):Microsoft Internet Explorer
Definition Synopsis
  • Win2K or XP,SP1 is installed
  • Windows 2000 is installed
  • OR Windows XP 32-bit SP1 is installed
  • Windows XP 32-bit edition is installed
  • Windows XP is installed
  • AND 32-Bit version of Windows is installed
  • AND Win2K/XP/2003/Vista service pack 1 is installed
  • AND a vulnerable version of mshtml.dll exists GDR/QFE
  • machine has followed the GDR update path and mshtml.dll is less than 6.0.2800.1522
  • OR machine has followed the QFE update path and mshtml.dll is less than 6.0.2800.1523
  • BACK