10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.965 High
EPSS
Percentile
99.6%
Microsoft Internet Explorer (IE) allows instantiation of COM objects not designed for use in the browser, which may allow a remote attacker to execute arbitrary code or crash IE.
Microsoft COM
Microsoft COM is a technology that allows programmers to create reusable software components that can be incorporated into applications to extend their functionality. Microsoft COM includes COM+, Distributed COM (DCOM), and ActiveX Controls.
ActiveX controls
ActiveX controls are COM objects that have visual elements. ActiveX controls are traditionally designed to be used in Internet Explorer. A web page can make use of an ActiveX control in various ways, such as by referencing its Class Identifier (CLSID) in an HTML OBJECT tag.
The Problem
Internet Explorer will attempt to instantiate any COM object that is referenced by a web page. Certain COM objects that are not designed for use in Internet Explorer may cause unexpected results, such as executing arbitrary code or crashing the browser.
Exploit code for these vulnerabilities are publicly available.
By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an email attachment), an attacker could execute arbitrary code with the privileges of the user. The attacker could also cause IE (or the program using the WebBrowser control) to crash.
Apply An Update
Apply the appropriate update, as specified in Microsoft Security Bulletin MS06-042. This update sets the “kill bit” for certain CLSID values of COM objects known to be vulnerable. The MS06-042 update is similar to MS06-021, MS06-013, MS05-054, MS05-037, MS05-038, and MS05-052, but it includes additional COM objects.
Microsoft has listed several workarounds in the Microsoft Security Bulletin, including disabling ActiveX controls.
959049
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: September 01, 2005 Updated: August 08, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please se Microsoft Security Bulletin MS06-042.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23959049 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to Microsoft for reporting this vulnerability.
This document was written by Will Dormann.
CVE IDs: | CVE-2005-1990 |
---|---|
Severity Metric: | 45.56 Date Public: |
cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2087
cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2831
cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2006-1303
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1990
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2127
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1186
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3638
secunia.com/advisories/16373/
www.microsoft.com/technet/security/bulletin/MS05-037.mspx
www.microsoft.com/technet/security/bulletin/MS05-038.mspx
www.microsoft.com/technet/security/Bulletin/MS05-052.mspx
www.microsoft.com/technet/security/Bulletin/MS05-054.mspx
www.microsoft.com/technet/security/Bulletin/MS06-013.mspx
www.microsoft.com/technet/security/Bulletin/MS06-021.mspx
www.microsoft.com/technet/security/bulletin/ms06-042.mspx
www.nsfocus.com/english/homepage/research/0502.htm
www.osvdb.org/displayvuln.php?osvdb_id=18612
www.securiteam.com/windowsntfocus/5WP0B00GLC.html
www.securityfocus.com/bid/14511