Vulnerability Name:

CVE-2006-5559 (CCN-29837)

Assigned:2006-10-24
Published:2006-10-24
Updated:2018-10-12
Summary:The Execute method in the ADODB.Connection 2.7 and 2.8 ActiveX control objects (ADODB.Connection.2.7 and ADODB.Connection.2.8) in the Microsoft Data Access Components (MDAC) 2.5 SP3, 2.7 SP1, 2.8, and 2.8 SP1 does not properly track freed memory when the second argument is a BSTR, which allows remote attackers to cause a denial of service (Internet Explorer crash) and possibly execute arbitrary code via certain strings in the second and third arguments.
Failed exploit attempts will likely result in an application level denial-of-service condition.
CVSS v3 Severity:9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.3 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-20
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Microsoft Security Response Center Blog, Friday, October 27, 2006 3:56 AM
ADODB.Connection POC Published.

Source: MISC
Type: UNKNOWN
http://blogs.technet.com/msrc/archive/2006/10/27/adodb-connection-poc-published.aspx

Source: MITRE
Type: CNA
CVE-2006-5559

Source: MISC
Type: Patch
http://research.eeye.com/html/alerts/zeroday/20061027.html

Source: CCN
Type: SA22452
Microsoft MDAC ADODB.Connection ActiveX Control Vulnerability

Source: SECUNIA
Type: Vendor Advisory
22452

Source: CCN
Type: SECTRACK ID: 1017127
Microsoft Data Access Components `ADODB.Connection` Execute Function Lets Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: Exploit, Patch, Vendor Advisory
1017127

Source: CCN
Type: ASA-2007-082
MS07-009 Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution (927779)

Source: CCN
Type: US-CERT VU#589272
ADODB.Connection ActiveX control memory corruption vulnerability

Source: CERT-VN
Type: Patch, US Government Resource
VU#589272

Source: CCN
Type: Microsoft Security Bulletin MS07-009
Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution (927779)

Source: OSVDB
Type: UNKNOWN
31882

Source: CCN
Type: OSVDB ID: 31882
Microsoft MDAC ADODB.Connection ActiveX Control Execute Method Remote Code Execution

Source: BID
Type: Exploit, Patch
20704

Source: CCN
Type: BID-20704
Microsoft Internet Explorer ADODB.Connection Execute Memory Corruption Vulnerability

Source: CERT
Type: US Government Resource
TA07-044A

Source: VUPEN
Type: Vendor Advisory
ADV-2007-0578

Source: MS
Type: UNKNOWN
MS07-009

Source: XF
Type: UNKNOWN
ie-adodbconnection-code-execution(29837)

Source: XF
Type: UNKNOWN
ie-adodbconnection-Code-Execution(29837)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:214

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
  • AND
  • cpe:/a:microsoft:data_access_components:2.5:sp3:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
  • AND
  • cpe:/a:microsoft:data_access_components:2.8:sp1:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:itanium:*:*:*:*:*:*:*
  • AND
  • cpe:/a:microsoft:data_access_components:2.8:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
  • AND
  • cpe:/a:microsoft:data_access_components:2.7:sp1:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
  • AND
  • cpe:/a:microsoft:data_access_components:2.8:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
  • AND
  • cpe:/a:microsoft:data_access_components:2.8:sp1:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:microsoft:data_access_components:2.8:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:data_access_components:2.8:sp1:*:*:*:*:*:*
  • OR cpe:/a:microsoft:data_access_components:2.5:sp3:*:*:*:*:*:*
  • OR cpe:/a:microsoft:data_access_components:2.7:sp1:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:-::~~~~itanium~:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:214
    V
    Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution
    2011-03-21
    BACK
    microsoft windows 2000 * sp4
    microsoft data access components 2.5 sp3
    microsoft windows xp * sp2
    microsoft data access components 2.8 sp1
    microsoft windows 2003 server *
    microsoft windows 2003 server itanium
    microsoft data access components 2.8
    microsoft windows 2000 * sp4
    microsoft data access components 2.7 sp1
    microsoft windows 2000 * sp4
    microsoft data access components 2.8
    microsoft windows 2000 * sp4
    microsoft data access components 2.8 sp1
    microsoft data access components 2.8
    microsoft data access components 2.8 sp1
    microsoft data access components 2.5 sp3
    microsoft data access components 2.7 sp1
    microsoft windows 2000 - sp4
    microsoft windows xp sp2
    microsoft windows 2003 server -