Windows operating systems use the Component Object Model (COM) to allow various program components to be run within different applications.
Improper instantiation of certain COM objects as ActiveX controls by Internet Explorer leads to a buffer overflow which can result in command execution.
Apply the patch referenced in Microsoft Security Bulletin 05-038.
This exploit requires a user to follow a link to the exploit from a vulnerable host. Exploit works on Internet Explorer 6.0.
Windows Server 2003