Lucene search

K
saintSAINT CorporationSAINT:B2E09FBBB71E145B9A84F21BF875B822
HistoryAug 27, 2009 - 12:00 a.m.

Microsoft Office Web Components DataSourceControl ActiveX Control memory allocation

2009-08-2700:00:00
SAINT Corporation
www.saintcorporation.com
17

0.929 High

EPSS

Percentile

98.8%

Added: 08/27/2009
CVE: CVE-2009-0562
BID: 35990
OSVDB: 56914

Background

Microsoft Office Web Components (OWC) are a group of OLE classes implemented as ActiveX controls.

Problem

A heap memory corruption vulnerability in the **OWC10.DataSourceControl** ActiveX control allows command execution when a user opens a web page which loads and unloads this control.

Resolution

Apply the update referenced in Microsoft Security Bulletin 09-043.

References

<http://www.microsoft.com/technet/security/Bulletin/MS09-043.mspx&gt;

Limitations

Exploit works on Microsoft Office 2003 SP3 on Windows XP SP3 English with DEP enabled and requires a user to load the exploit page in Internet Explorer 6 or 7. After the published page is loaded in Internet Explorer, the target user must move the mouse in order to trigger the vulnerability. Note that this exploit is not 100% reliable due to the nature of heap memory corruption.

Platforms

Windows XP

0.929 High

EPSS

Percentile

98.8%