Vulnerability Name:

CCN-52052

Published:2009-07-28
Updated:2009-07-28
Summary:Microsoft Internet Explorer could allow a remote attacker to bypass security restrictions, caused by an error in the Microsoft Active Template Library (ATL). By persuading a victim to visit a specially-crafted Web site, an attacker could exploit this vulnerability to bypass the ActiveX control killbit protection mechanism and possibly execute arbitrary code with privileges of the victim.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 High (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: SA35962
Internet Explorer Three Vulnerabilities

Source: CCN
Type: SA36049
Adobe Shockwave Player Active Template Library Vulnerabilities

Source: CCN
Type: SA36052
Cisco Unity Active Template Library Security Bypass Vulnerability

Source: CCN
Type: Microsoft Security Bulletin MS11-099
Cumulative Security Update for Internet Explorer (2618444)

Source: CCN
Type: Microsoft Security Bulletin MS12-010
Cumulative Security Update for Internet Explorer (2647516)

Source: CCN
Type: Microsoft Security Bulletin MS12-023
Cumulative Security Update for Internet Explorer (2675157)

Source: CCN
Type: Microsoft Security Bulletin MS12-037
Cumulative Security Update for Internet Explorer (2699988)

Source: CCN
Type: Microsoft Security Bulletin MS12-044
Cumulative Security Update for Internet Explorer (2719177)

Source: CCN
Type: Microsoft Security Bulletin MS12-052
Cumulative Security Update for Internet Explorer (2722913)

Source: CCN
Type: IBM Internet Security Systems Protection Advisory
Microsoft Internet Explorer ATL Killbit Evasion

Source: CCN
Type: Microsoft Security Bulletin MS09-034
Cumulative Security Update for Internet Explorer (972260)

Source: CCN
Type: Microsoft Security Bulletin MS09-054
Cumulative Security Update for Internet Explorer (974455)

Source: CCN
Type: Microsoft Security Bulletin MS09-072
Cumulative Security Update for Internet Explorer (976325)

Source: CCN
Type: Microsoft Security Bulletin MS10-002
Cumulative Security Update for Internet Explorer (978207)

Source: CCN
Type: Microsoft Security Bulletin MS10-018
Cumulative Security Update for Internet Explorer (980182)

Source: CCN
Type: Microsoft Security Bulletin MS10-035
Cumulative Security Update for Internet Explorer (982381)

Source: CCN
Type: Microsoft Security Bulletin MS10-053
Cumulative Security Update for Internet Explorer (2183461)

Source: CCN
Type: Microsoft Security Bulletin MS10-071
Cumulative Security Update for Internet Explorer (2360131)

Source: CCN
Type: Microsoft Security Bulletin MS10-090
Cumulative Security Update for Internet Explorer (2416400)

Source: CCN
Type: Microsoft Security Bulletin MS11-003
Cumulative Security Update for Internet Explorer (2482017)

Source: CCN
Type: Microsoft Security Bulletin MS11-018
Cumulative Security Update for Internet Explorer (2497640)

Source: CCN
Type: Microsoft Security Bulletin MS11-050
Cumulative Security Update for Internet Explorer (2530548)

Source: CCN
Type: Microsoft Security Bulletin MS11-057
Cumulative Security Update for Internet Explorer (2559049)

Source: CCN
Type: Microsoft Security Bulletin MS11-081
Cumulative Security Update for Internet Explorer (2586448)

Source: XF
Type: UNKNOWN
ie-atl-activex-killbit-bypass(52052)

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:microsoft:ie:*:*:*:*:*:*:*:*
  • AND
  • cpe:/a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:unity_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    microsoft ie *
    adobe shockwave player 10.1.0.11
    cisco unity server 4.0
    adobe shockwave player 11.5.0.596
    adobe shockwave player 11.0.0.456
    adobe shockwave player 11.5.1.601