7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.002 Low
EPSS
Percentile
60.2%
A vulnerability in a way that various programs handle COM objects could allow a local attacker to execute arbitrary code on a vulnerable system.
Microsoft’s COM is a data representation that allows multiple kinds of objects to be stored in one document. COM structured storage defines how to treat a single file entity as a structured collection of two types of objects, storages and streams, that behave like directories and files respectively. An error in the way that the affected operating systems and programs access memory when they process COM structured storage files or objects results in a vulnerability that could allow local attackers to gain elevated privileges. Additional details about the underlying cause of the vulnerability are not known. An authenticated local attacker with the ability to run a specially-crafted application could exploit this vulnerability to gain elevated privileges on the affected system.
An authenticated local attacker could execute arbitrary code on a vulnerable system to gain elevated privileges. The attacker-supplied code would be executed with the privileges of the component that exposes the vulnerability.
Apply a patch
Microsoft has published Microsoft Security Bulletin MS05-012 in response to this issue. Users are strongly encouraged to review this bulletin and apply the patches it refers to.
597889
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: February 08, 2005
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Microsoft has published Microsoft Security Bulletin MS05-012 in response to this issue. Users are strongly encouraged to review this bulletin and apply the patches it refers to.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23597889 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
<http://www.microsoft.com/technet/security/bulletin/ms05-012.mspx>
Thanks to Microsoft Security for reporting this vulnerability. Microsoft, in turn, thanks Cesar Cerrudo of Application Security Inc. for reporting this issue to them.
This document was written by Chad R Dougherty based upon information provided by Microsoft.
CVE IDs: | CVE-2005-0047 |
---|---|
Severity Metric: | 10.69 Date Public: |