5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.964 High
EPSS
Percentile
99.5%
The JVIEW Profiler COM object contains an unspecified vulnerability, which may allow a remote attacker to execute arbitrary code on a vulnerable system.
Microsoft COM
Microsoft COM is a technology that allows programmers to create reusable software components that can be incorporated into applications to extend their functionality. Microsoft COM includes COM+, Distributed COM (DCOM), and ActiveX Controls.
ActiveX controls
ActiveX controls are COM objects that are designed to be used in Internet Explorer. A web page can make use of an ActiveX control through the use of the OBJECT
tag.
JVIEW Profiler
The JVIEW Profiler is a COM object provided by javaprxy.dll
, which is an interface to the debugger in the Microsoft Java Virtual Machine.
The Problem
Internet Explorer will attempt to instantiate any COM object that is referenced by a web page. COM objects that are not ActiveX controls may cause unexpected results, such as crashing Internet Explorer. The JVIEW Profiler COM object crashes in a way that can be exploited to execute arbitrary code on a vulnerable system.
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message), an attacker could execute arbitrary code with the privileges of the user. The attacker could also cause IE (or the program using the WebBrowser control) to crash.
Proof of concept code is publicly available.
Apply An Update
Apply the appropriate update, as specified in the Microsoft Security Bulletin. This update sets the “kill bit” for the JVIEW Profiler COM object.
Microsoft has listed several workarounds in the Microsoft Security Bulletin, including disabling ActiveX controls, disabling Active scripting, and unregistering javaprxy.dll
.
939605
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: June 30, 2005 Updated: July 02, 2005
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see the Microsoft Security Advisory.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23939605 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was publicly reported by Bernhard Mueller.
This document was written by Will Dormann.
CVE IDs: | CVE-2005-2087 |
---|---|
Severity Metric: | 44.55 Date Public: |
secunia.com/advisories/15891/
www.microsoft.com/technet/security/advisory/903144.mspx
www.microsoft.com/technet/security/bulletin/ms05-037.mspx
www.osvdb.org/displayvuln.php?osvdb_id=17680
www.sec-consult.com/184.html
www.securityfocus.com/bid/14087
www.securitytracker.com/alerts/2005/Jun/1014329.html
www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33120
xforce.iss.net/xforce/xfdb/21193