JVIEW Profiler (javaprxy.dll) COM object contains an unspecified vulnerability

ID VU:939605
Type cert
Reporter CERT
Modified 2005-07-12T17:24:00



The JVIEW Profiler COM object contains an unspecified vulnerability, which may allow a remote attacker to execute arbitrary code on a vulnerable system.


Microsoft COM

Microsoft COM is a technology that allows programmers to create reusable software components that can be incorporated into applications to extend their functionality. Microsoft COM includes COM+, Distributed COM (DCOM), and ActiveX Controls.

ActiveX controls

ActiveX controls are COM objects that are designed to be used in Internet Explorer. A web page can make use of an ActiveX control through the use of the OBJECT tag.

JVIEW Profiler

The JVIEW Profiler is a COM object provided by javaprxy.dll, which is an interface to the debugger in the Microsoft Java Virtual Machine.

The Problem

Internet Explorer will attempt to instantiate any COM object that is referenced by a web page. COM objects that are not ActiveX controls may cause unexpected results, such as crashing Internet Explorer. The JVIEW Profiler COM object crashes in a way that can be exploited to execute arbitrary code on a vulnerable system.


By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message), an attacker could execute arbitrary code with the privileges of the user. The attacker could also cause IE (or the program using the WebBrowser control) to crash.
Proof of concept code is publicly available.


Apply An Update
Apply the appropriate update, as specified in the Microsoft Security Bulletin. This update sets the "kill bit" for the JVIEW Profiler COM object.

Microsoft has listed several workarounds in the Microsoft Security Bulletin, including disabling ActiveX controls, disabling Active scripting, and unregistering javaprxy.dll.

Vendor Information


Filter by status: All Affected Not Affected Unknown

Filter by content: __ Vendor has issued information

__ Sort by: Status Alphabetical

Expand all

Affected Unknown __ Unaffected

Javascript is disabled. Click here to view vendors.

__ Microsoft Corporation

Notified: June 30, 2005 Updated: July 02, 2005


__ Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


Please see the Microsoft Security Advisory.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | | N/A


  • <http://www.microsoft.com/technet/security/bulletin/ms05-037.mspx>
  • <http://www.microsoft.com/technet/security/advisory/903144.mspx>
  • <http://www.sec-consult.com/184.html>
  • <http://secunia.com/advisories/15891/>
  • <http://www.securitytracker.com/alerts/2005/Jun/1014329.html>
  • <http://www.osvdb.org/displayvuln.php?osvdb_id=17680>
  • <http://www.securityfocus.com/bid/14087>
  • <http://xforce.iss.net/xforce/xfdb/21193>
  • <http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33120>


This vulnerability was publicly reported by Bernhard Mueller.

This document was written by Will Dormann.

Other Information

CVE IDs: | CVE-2005-2087
Severity Metric:** | 44.55
Date Public:
| 2005-06-29
Date First Published: | 2005-07-02
Date Last Updated: | 2005-07-12 17:24 UTC
Document Revision: | 28