Lucene search

K
certCERTVU:939605
HistoryJul 02, 2005 - 12:00 a.m.

JVIEW Profiler (javaprxy.dll) COM object contains an unspecified vulnerability

2005-07-0200:00:00
www.kb.cert.org
25

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.964 High

EPSS

Percentile

99.5%

Overview

The JVIEW Profiler COM object contains an unspecified vulnerability, which may allow a remote attacker to execute arbitrary code on a vulnerable system.

Description

Microsoft COM

Microsoft COM is a technology that allows programmers to create reusable software components that can be incorporated into applications to extend their functionality. Microsoft COM includes COM+, Distributed COM (DCOM), and ActiveX Controls.

ActiveX controls

ActiveX controls are COM objects that are designed to be used in Internet Explorer. A web page can make use of an ActiveX control through the use of the OBJECT tag.

JVIEW Profiler

The JVIEW Profiler is a COM object provided by javaprxy.dll, which is an interface to the debugger in the Microsoft Java Virtual Machine.

The Problem

Internet Explorer will attempt to instantiate any COM object that is referenced by a web page. COM objects that are not ActiveX controls may cause unexpected results, such as crashing Internet Explorer. The JVIEW Profiler COM object crashes in a way that can be exploited to execute arbitrary code on a vulnerable system.


Impact

By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message), an attacker could execute arbitrary code with the privileges of the user. The attacker could also cause IE (or the program using the WebBrowser control) to crash.
Proof of concept code is publicly available.


Solution

Apply An Update
Apply the appropriate update, as specified in the Microsoft Security Bulletin. This update sets the “kill bit” for the JVIEW Profiler COM object.


Microsoft has listed several workarounds in the Microsoft Security Bulletin, including disabling ActiveX controls, disabling Active scripting, and unregistering javaprxy.dll.


Vendor Information

939605

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Notified: June 30, 2005 Updated: July 02, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see the Microsoft Security Advisory.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23939605 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was publicly reported by Bernhard Mueller.

This document was written by Will Dormann.

Other Information

CVE IDs: CVE-2005-2087
Severity Metric: 44.55 Date Public:

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.964 High

EPSS

Percentile

99.5%