Lucene search

K
saintSAINT CorporationSAINT:C0F74DAF2B54B6A8B189AE35358DE447
HistoryAug 27, 2009 - 12:00 a.m.

Microsoft Office Web Components DataSourceControl ActiveX Control memory allocation

2009-08-2700:00:00
SAINT Corporation
my.saintcorporation.com
24

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.853 High

EPSS

Percentile

98.5%

Added: 08/27/2009
CVE: CVE-2009-0562
BID: 35990
OSVDB: 56914

Background

Microsoft Office Web Components (OWC) are a group of OLE classes implemented as ActiveX controls.

Problem

A heap memory corruption vulnerability in the **OWC10.DataSourceControl** ActiveX control allows command execution when a user opens a web page which loads and unloads this control.

Resolution

Apply the update referenced in Microsoft Security Bulletin 09-043.

References

<http://www.microsoft.com/technet/security/Bulletin/MS09-043.mspx&gt;

Limitations

Exploit works on Microsoft Office 2003 SP3 on Windows XP SP3 English with DEP enabled and requires a user to load the exploit page in Internet Explorer 6 or 7. After the published page is loaded in Internet Explorer, the target user must move the mouse in order to trigger the vulnerability. Note that this exploit is not 100% reliable due to the nature of heap memory corruption.

Platforms

Windows XP

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.853 High

EPSS

Percentile

98.5%