All the vulnerabilites related to ati - catalyst_driver
cve-2005-2127
Vulnerability from cvelistv5
Published
2005-08-19 04:00
Modified
2024-08-07 22:15
Severity ?
EPSS score ?
Summary
Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:15:37.364Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#959049", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/959049" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://isc.sans.org/diary.php?date=2005-08-18" }, { "name": "20070606 IE 6/Microsoft Html Popup Window (mshtml.dll) DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/470690/100/0/threaded" }, { "name": "72", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/72" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf" }, { "name": "TA05-347A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-347A.html" }, { "name": "MS05-052", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-052" }, { "name": "15061", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15061" }, { "name": "17223", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17223" }, { "name": "oval:org.mitre.oval:def:1454", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1454" }, { "name": "16480", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16480" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.microsoft.com/technet/security/advisory/906267.mspx" }, { "name": "microsoft-ie-mshtml-dos(34754)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34754" }, { "name": "17172", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17172" }, { "name": "oval:org.mitre.oval:def:1538", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1538" }, { "name": "Win-msdss-command-execution(21895)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21895" }, { "name": "oval:org.mitre.oval:def:1535", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1535" }, { "name": "14594", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14594" }, { "name": "oval:org.mitre.oval:def:1468", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1468" }, { "name": "17509", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17509" }, { "name": "TA06-220A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-220A.html" }, { "name": "oval:org.mitre.oval:def:1464", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1464" }, { "name": "VU#740372", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/740372" }, { "name": "VU#898241", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/898241" }, { "name": "1014727", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014727" }, { "name": "TA05-284A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-284A.html" }, { "name": "ADV-2005-1450", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/1450" }, { "name": "oval:org.mitre.oval:def:1155", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1155" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-08-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the \"COM Object Instantiation Memory Corruption vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "VU#959049", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/959049" }, { "tags": [ "x_refsource_MISC" ], "url": "http://isc.sans.org/diary.php?date=2005-08-18" }, { "name": "20070606 IE 6/Microsoft Html Popup Window (mshtml.dll) DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/470690/100/0/threaded" }, { "name": "72", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/72" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf" }, { "name": "TA05-347A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-347A.html" }, { "name": "MS05-052", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-052" }, { "name": "15061", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15061" }, { "name": "17223", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17223" }, { "name": "oval:org.mitre.oval:def:1454", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1454" }, { "name": "16480", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16480" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.microsoft.com/technet/security/advisory/906267.mspx" }, { "name": "microsoft-ie-mshtml-dos(34754)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34754" }, { "name": "17172", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17172" }, { "name": "oval:org.mitre.oval:def:1538", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1538" }, { "name": "Win-msdss-command-execution(21895)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21895" }, { "name": "oval:org.mitre.oval:def:1535", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1535" }, { "name": "14594", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14594" }, { "name": "oval:org.mitre.oval:def:1468", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1468" }, { "name": "17509", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17509" }, { "name": "TA06-220A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-220A.html" }, { "name": "oval:org.mitre.oval:def:1464", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1464" }, { "name": "VU#740372", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/740372" }, { "name": "VU#898241", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/898241" }, { "name": "1014727", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014727" }, { "name": "TA05-284A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-284A.html" }, { "name": "ADV-2005-1450", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/1450" }, { "name": "oval:org.mitre.oval:def:1155", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1155" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2005-2127", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the \"COM Object Instantiation Memory Corruption vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#959049", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/959049" }, { "name": "http://isc.sans.org/diary.php?date=2005-08-18", "refsource": "MISC", "url": "http://isc.sans.org/diary.php?date=2005-08-18" }, { "name": "20070606 IE 6/Microsoft Html Popup Window (mshtml.dll) DoS", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/470690/100/0/threaded" }, { "name": "72", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/72" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf" }, { "name": "TA05-347A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA05-347A.html" }, { "name": "MS05-052", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-052" }, { "name": "15061", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15061" }, { "name": "17223", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17223" }, { "name": "oval:org.mitre.oval:def:1454", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1454" }, { "name": "16480", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16480" }, { "name": "http://www.microsoft.com/technet/security/advisory/906267.mspx", "refsource": "MISC", "url": "http://www.microsoft.com/technet/security/advisory/906267.mspx" }, { "name": "microsoft-ie-mshtml-dos(34754)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34754" }, { "name": "17172", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17172" }, { "name": "oval:org.mitre.oval:def:1538", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1538" }, { "name": "Win-msdss-command-execution(21895)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21895" }, { "name": "oval:org.mitre.oval:def:1535", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1535" }, { "name": "14594", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14594" }, { "name": "oval:org.mitre.oval:def:1468", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1468" }, { "name": "17509", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17509" }, { "name": "TA06-220A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-220A.html" }, { "name": "oval:org.mitre.oval:def:1464", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1464" }, { "name": "VU#740372", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/740372" }, { "name": "VU#898241", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/898241" }, { "name": "1014727", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014727" }, { "name": "TA05-284A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA05-284A.html" }, { "name": "ADV-2005-1450", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/1450" }, { "name": "oval:org.mitre.oval:def:1155", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1155" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2005-2127", "datePublished": "2005-08-19T04:00:00", "dateReserved": "2005-07-02T00:00:00", "dateUpdated": "2024-08-07T22:15:37.364Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4315
Vulnerability from cvelistv5
Published
2007-08-13 21:00
Modified
2024-08-07 14:53
Severity ?
EPSS score ?
Summary
The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by "Purple Pill".
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/26448 | third-party-advisory, x_refsource_SECUNIA | |
http://blogs.zdnet.com/security/?p=438 | x_refsource_MISC | |
http://www.securityfocus.com/bid/25265 | vdb-entry, x_refsource_BID | |
http://blogs.zdnet.com/security/?p=427 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:53:55.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "26448", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26448" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blogs.zdnet.com/security/?p=438" }, { "name": "25265", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25265" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blogs.zdnet.com/security/?p=427" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by \"Purple Pill\"." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-08-22T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "26448", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26448" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blogs.zdnet.com/security/?p=438" }, { "name": "25265", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25265" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blogs.zdnet.com/security/?p=427" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4315", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by \"Purple Pill\"." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "26448", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26448" }, { "name": "http://blogs.zdnet.com/security/?p=438", "refsource": "MISC", "url": "http://blogs.zdnet.com/security/?p=438" }, { "name": "25265", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25265" }, { "name": "http://blogs.zdnet.com/security/?p=427", "refsource": "MISC", "url": "http://blogs.zdnet.com/security/?p=427" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4315", "datePublished": "2007-08-13T21:00:00", "dateReserved": "2007-08-13T00:00:00", "dateUpdated": "2024-08-07T14:53:55.183Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-4625
Vulnerability from cvelistv5
Published
2006-01-06 11:00
Modified
2024-08-07 23:53
Severity ?
EPSS score ?
Summary
Drivers for certain display adapters, including (1) an unspecified ATI driver and (2) an unspecified Intel driver, might allow remote attackers to cause a denial of service (system crash) via a large JPEG image, as demonstrated in Internet Explorer using stoopid.jpg with a width and height of 9999999.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/420847/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/archive/1/420947/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/archive/1/420930/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:53:28.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20051231 Dumb IE6/XP denial of service found on the web", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/420847/100/0/threaded" }, { "name": "20060105 RE: Dumb IE6/XP denial of service found on the web", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/420947/100/0/threaded" }, { "name": "20060105 Re: Dumb IE6/XP denial of service found on the web", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/420930/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-12-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Drivers for certain display adapters, including (1) an unspecified ATI driver and (2) an unspecified Intel driver, might allow remote attackers to cause a denial of service (system crash) via a large JPEG image, as demonstrated in Internet Explorer using stoopid.jpg with a width and height of 9999999." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20051231 Dumb IE6/XP denial of service found on the web", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/420847/100/0/threaded" }, { "name": "20060105 RE: Dumb IE6/XP denial of service found on the web", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/420947/100/0/threaded" }, { "name": "20060105 Re: Dumb IE6/XP denial of service found on the web", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/420930/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4625", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Drivers for certain display adapters, including (1) an unspecified ATI driver and (2) an unspecified Intel driver, might allow remote attackers to cause a denial of service (system crash) via a large JPEG image, as demonstrated in Internet Explorer using stoopid.jpg with a width and height of 9999999." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20051231 Dumb IE6/XP denial of service found on the web", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/420847/100/0/threaded" }, { "name": "20060105 RE: Dumb IE6/XP denial of service found on the web", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/420947/100/0/threaded" }, { "name": "20060105 Re: Dumb IE6/XP denial of service found on the web", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/420930/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4625", "datePublished": "2006-01-06T11:00:00", "dateReserved": "2006-01-06T00:00:00", "dateUpdated": "2024-08-07T23:53:28.280Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2007-08-13 21:17
Modified
2024-11-21 00:35
Severity ?
Summary
The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by "Purple Pill".
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | catalyst_driver | * | |
ati | catalyst_driver | * | |
microsoft | windows_vista | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:catalyst_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "9AC4E5D1-DA07-4907-8AC7-05764322C414", "vulnerable": true }, { "criteria": "cpe:2.3:a:ati:catalyst_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "62E822DD-6123-4CD8-9FE4-BC8A91D94F80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by \"Purple Pill\"." }, { "lang": "es", "value": "El controlador AMD ATI atidsmxx.sys 3.0.502.0 en Windows Vista permite a usuarios locales evitar la pol\u00edtica de firma del controlador, escribir en zonas de memoria del n\u00facleo, y de ese modo obtener privilegios mediante vectores no especificados, como ha sido demostrado por \"Purple Pill\"." } ], "id": "CVE-2007-4315", "lastModified": "2024-11-21T00:35:17.910", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-08-13T21:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://blogs.zdnet.com/security/?p=427" }, { "source": "cve@mitre.org", "url": "http://blogs.zdnet.com/security/?p=438" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26448" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/25265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blogs.zdnet.com/security/?p=427" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blogs.zdnet.com/security/?p=438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26448" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/25265" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-31 05:00
Modified
2024-11-21 00:04
Severity ?
Summary
Drivers for certain display adapters, including (1) an unspecified ATI driver and (2) an unspecified Intel driver, might allow remote attackers to cause a denial of service (system crash) via a large JPEG image, as demonstrated in Internet Explorer using stoopid.jpg with a width and height of 9999999.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ati | catalyst_driver | * | |
intel | display_adapter_driver | * | |
microsoft | internet_explorer | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ati:catalyst_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "62E822DD-6123-4CD8-9FE4-BC8A91D94F80", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:display_adapter_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "86BC7F66-B17A-46B3-A4C1-95971EB8DFC5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*", "matchCriteriaId": "8682FAF3-98E3-485C-89CB-C0358C4E2AB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Drivers for certain display adapters, including (1) an unspecified ATI driver and (2) an unspecified Intel driver, might allow remote attackers to cause a denial of service (system crash) via a large JPEG image, as demonstrated in Internet Explorer using stoopid.jpg with a width and height of 9999999." } ], "id": "CVE-2005-4625", "lastModified": "2024-11-21T00:04:46.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2005-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/420847/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/420930/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/420947/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/420847/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/420930/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/420947/100/0/threaded" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-08-19 04:00
Modified
2024-11-20 23:58
Severity ?
Summary
Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ati:catalyst_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "62E822DD-6123-4CD8-9FE4-BC8A91D94F80", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:.net_framework:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A927C9E-5CCC-4FC1-AE63-24B96A5FC51A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:.net_framework:1.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "0BF6AE15-EAC3-4100-A742-211026C79CCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:.net_framework:1.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "A2804E22-FFF4-4301-8958-16B32CE5ECD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:.net_framework:1.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "B33B1B47-EEA0-4B1F-AC03-CAB56AB42DC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*", "matchCriteriaId": "49AD45BF-8A91-4C87-AF15-D38D8468A4C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*", "matchCriteriaId": "A9A82D13-513C-46FA-AF51-0582233E230A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2000:*:*:ja:*:*:*:*", "matchCriteriaId": "757EC6C1-F5E2-45CD-9F7F-7760ECEDC842", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2000:*:*:ko:*:*:*:*", "matchCriteriaId": "59B1B68C-86F1-4FA4-9F82-3E8761ED1E74", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2000:*:*:zh:*:*:*:*", "matchCriteriaId": "716DDA05-D094-4837-852C-0511CDDD5ABC", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2000:sp1:*:*:*:*:*:*", "matchCriteriaId": "3C54DDAF-8D7F-4A7D-9186-6048D4C850B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2000:sp2:*:*:*:*:*:*", "matchCriteriaId": "67388076-420D-4327-A436-329177EA6F42", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*", "matchCriteriaId": "4891122F-AD7F-45E6-98C6-833227916F6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:xp:sp1:*:*:*:*:*:*", "matchCriteriaId": "5AB85A3C-EFA3-485D-84C5-7976718AEAE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:xp:sp2:*:*:*:*:*:*", "matchCriteriaId": "9D02D769-061D-44A5-B019-F4E653DF615A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "79BA1175-7F02-4435-AEA6-1BA8AADEB7EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project:98:*:*:*:*:*:*:*", "matchCriteriaId": "77BFDC2A-4AE1-4FC8-ABA7-0400D46EA587", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project:2000:*:*:*:*:*:*:*", "matchCriteriaId": "3F09162C-01F0-4056-94D3-995713F92AE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project:2002:*:*:*:*:*:*:*", "matchCriteriaId": "2AE2D3E0-49E4-410E-B63A-753BDE8995BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project:2002:sp1:*:*:*:*:*:*", "matchCriteriaId": "9B14AE8E-1BFF-4458-87CC-357957F18F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project:2003:*:*:*:*:*:*:*", "matchCriteriaId": "34EFAEFE-2BDE-4111-91F5-E9F75ADFA920", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project:2003:sp1:*:*:*:*:*:*", "matchCriteriaId": "AC1DA2B8-C41B-4EB9-A58F-E4E63F695A55", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2000:sr1:*:*:enterprise:*:*:*", "matchCriteriaId": "B4EC96E0-8D7C-4C72-8F04-97B0B675306E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2002:*:*:*:*:*:*:*", "matchCriteriaId": "8E24DF34-F4A8-4C28-9593-F019FE3E3BA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2002:*:*:*:professional:*:*:*", "matchCriteriaId": "FF41DACB-D707-4ED3-BA2E-2EEABC17FC4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2002:sp1:*:*:*:*:*:*", "matchCriteriaId": "70D447B9-4604-447C-88FC-F5DC8F77603C", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2002:sp2:*:*:*:*:*:*", "matchCriteriaId": "D0D2C5C3-225C-49DC-B9C7-C5BC05900F2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2002:sp2:*:*:professional:*:*:*", "matchCriteriaId": "F6E69C81-2894-4319-9FBD-60AE719942E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2002:sp2:*:*:standard:*:*:*", "matchCriteriaId": "8BC60369-95D2-475B-9FDA-5D1C13FEE8DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2003:*:*:*:*:*:*:*", "matchCriteriaId": "511E22C6-DB04-44A0-906D-F432DD42CA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2003:*:*:*:professional:*:*:*", "matchCriteriaId": "9BF7D109-38E6-4FEE-8F9B-9A481D50DCFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2003:*:*:*:standard:*:*:*", "matchCriteriaId": "3D931561-2312-4770-B418-FB622856DF34", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2003:sp1:*:*:*:*:*:*", "matchCriteriaId": "6FBEFBED-72F3-447B-8164-9E5C16828484", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visual_studio_.net:2002:gold:*:*:*:*:*:*", "matchCriteriaId": "E17BD019-DD35-413E-ACBA-2E77C8A1247D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visual_studio_.net:2003:*:*:*:enterprise_architect:*:*:*", "matchCriteriaId": "A681100F-9DE5-4BE6-ADE9-64A3808C7CDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visual_studio_.net:2003:gold:*:*:*:*:*:*", "matchCriteriaId": "B9E6C132-4F4B-4FB0-9DDC-DD9750D8552D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:academic:*:*:*", "matchCriteriaId": "AEC99110-8EC1-4FEC-9535-B27AF1965DBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:enterprise_architect:*:*:*", "matchCriteriaId": "B35FE238-4380-41C7-A956-EA3F2D5F9159", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:enterprise_developer:*:*:*", "matchCriteriaId": "A8E772B4-8E7D-4D35-8C59-5959123AA572", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:professional:*:*:*", "matchCriteriaId": "4AFEC24E-5FA5-4653-BBAA-AFEBCC3F149B", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:trial:*:*:*", "matchCriteriaId": "D451D000-00DC-46A9-9D1E-2C715D6D1787", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the \"COM Object Instantiation Memory Corruption vulnerability.\"" } ], "id": "CVE-2005-2127", "lastModified": "2024-11-20T23:58:51.623", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-08-19T04:00:00.000", "references": [ { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory" ], "url": "http://isc.sans.org/diary.php?date=2005-08-18" }, { "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16480" }, { "source": "secure@microsoft.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://secunia.com/advisories/17172" }, { "source": "secure@microsoft.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://secunia.com/advisories/17223" }, { "source": "secure@microsoft.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://secunia.com/advisories/17509" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory" ], "url": "http://securityreason.com/securityalert/72" }, { "source": "secure@microsoft.com", "tags": [ "Exploit", "Patch", "Third Party Advisory", "VDB Entry", "Vendor Advisory" ], "url": "http://securitytracker.com/id?1014727" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/740372" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/898241" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/959049" }, { "source": "secure@microsoft.com", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "http://www.microsoft.com/technet/security/advisory/906267.mspx" }, { "source": "secure@microsoft.com", "url": "http://www.securityfocus.com/archive/1/470690/100/0/threaded" }, { "source": "secure@microsoft.com", "tags": [ "Exploit", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/14594" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/15061" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-284A.html" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-347A.html" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-220A.html" }, { "source": "secure@microsoft.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2005/1450" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-052" }, { "source": "secure@microsoft.com", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21895" }, { "source": "secure@microsoft.com", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34754" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1155" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1454" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1464" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1468" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1535" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1538" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://isc.sans.org/diary.php?date=2005-08-18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://secunia.com/advisories/17172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://secunia.com/advisories/17223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://secunia.com/advisories/17509" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://securityreason.com/securityalert/72" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory", "VDB Entry", "Vendor Advisory" ], "url": "http://securitytracker.com/id?1014727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/740372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/898241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/959049" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "http://www.microsoft.com/technet/security/advisory/906267.mspx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/470690/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/14594" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/15061" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-284A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA05-347A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-220A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2005/1450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21895" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34754" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1454" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1464" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1468" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1535" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1538" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }