exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

NSFOCUS Security Advisory 2005.2

NSFOCUS Security Advisory 2005.2
Posted Aug 11, 2005
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory - NSFocus Security Team discovered a security vulnerability in Microsoft Internet Explorer. By crafting a malicious HTML page and alluring users to visit it, a remote attacker can execute arbitrary code with the privilege of the user. Internet Explorer does not properly call interface arguments when instantiating COM component in devenum.dll, resulting in exceptional memory access which might cause IE to crash. Carefully crafted HTML page might allow a remote attacker to execute arbitrary code. Affected are Microsoft Internet Explorer 5.01 SP4, 5.5 SP2, 6, and 6 SP1.

tags | advisory, remote, arbitrary
advisories | CVE-2005-1990
SHA-256 | 0131b5e2ab757713b9e722795d1a5527462cf0b4dfd3cfd0d6be0d279fc1ca30

NSFOCUS Security Advisory 2005.2

Change Mirror Download
NSFOCUS Security Advisory(SA2005-02)

Topic: Microsoft IE Devenum.dll COM Instantiation Remote Code Execution Vulnerability

Release Date: 2005-08-10

CVE CAN ID: CAN-2005-1990

http://www.nsfocus.com/english/homepage/research/0502.htm

Affected systems & software
===========================

Microsoft Internet Explorer 5.01 SP4
Microsoft Internet Explorer 5.5 SP2
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6 SP1

Unaffected systems & software
=============================


Description
============

NSFocus Security Team discovered a security vulnerability in Microsoft Internet
Explorer. By crafting a malicious HTML page and alluring users to visit it,
a remote attacker can execute arbitrary code with the privilege of the user.

Internet Explorer does not properly call interface arguments when instantiating
COM component in devenum.dll, resulting in exceptional memory access which
might cause IE to crash. Carefully crafted HTML page might allow a remote
attacker to execute arbitrary code.

Workaround
=============

Disable ActiveX control in Internet Explorer.

Vendor Status
==============

2005.07.13 Informed the vendor.
2005.07.16 The vendor confirmed the vulnerability
2005.08.09 The vendor releases a security bulletin (MS05-038) and related
patches.

Detail Microsoft Security Bulletin is available at:
http://www.microsoft.com/technet/security/bulletin/MS05-038.mspx

Additional Information
========================

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CAN-2005-1990 to this issue. This is a candidate for inclusion in the
CVE list (http://cve.mitre.org), which standardizes names for security problems.
Candidates may change significantly before they become official CVE entries.

Acknowledgment
===============

Hu Qianwei of NSFOCUS Security Team found the vulnerability.

DISCLAIMS
==========
THE INFORMATION PROVIDED IS RELEASED BY NSFOCUS "AS IS" WITHOUT WARRANTY
OF ANY KIND. NSFOCUS DISCLAIMS ALL WARRANTIES, EITHER EXPRESSED OR IMPLIED,
EXCEPT FOR THE WARRANTIES OF MERCHANTABILITY. IN NO EVENT SHALL NSFOCUS
BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL,CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES,
EVEN IF NSFOCUS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
DISTRIBUTION OR REPRODUCTION OF THE INFORMATION IS PROVIDED THAT THE
ADVISORY IS NOT MODIFIED IN ANY WAY.

Copyright 1999-2005 NSFOCUS. All Rights Reserved. Terms of use.


NSFOCUS Security Team <security@nsfocus.com>
NSFOCUS INFORMATION TECHNOLOGY CO.,LTD
(http://www.nsfocus.com)

PGP Key: http://www.nsfocus.com/homepage/research/pgpkey.asc
Key fingerprint = F8F2 F5D1 EF74 E08C 02FE 1B90 D7BF 7877 C6A6 F6DA

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close