Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."
CVE Status: Modified
References:
[email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected][email protected]af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108
Metrics:
No CVSS data available
Links:
Exploit-db
Github