Microsoft Visual Studio WMI Object Broker ActiveX Control Lets Remote Users Execute Arbitrary Code
|
SecurityTracker Alert ID: 1017142 |
SecurityTracker URL: http://securitytracker.com/id/1017142
|
CVE Reference:
CVE-2006-4704
(Links to External Site)
|
Updated: Dec 12 2006
|
Original Entry Date: Nov 1 2006
|
Impact:
Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes Exploit Included: Yes
|
Version(s): 2005
|
Description:
A vulnerability was reported in Microsoft Visual Studio. A remote user can cause arbitrary code to be executed on the target user's system.
A remote user can create specially crafted HTML that, when loaded by the target user, will load the WMI Object Broker control from 'WmiScriptUtils.dll' and execute arbitrary code on the target user's system. The code will run with the privileges of the target user.
A demonstration exploit is publicly available.
On November 8, 2006, Microsoft reported that this vulnerability is being actively exploited.
Microsoft credited TippingPoint with reporting this vulnerability.
|
Impact:
A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.
|
Solution:
The vendor has issued the following fixes:
Microsoft Visual Studio 2005:
http://www.microsoft.com/downloads/details.aspx?FamilyId=C2682C53-8E9A-4C7D-B782-BE78512DCBFA
A restart may be required.
The Microsoft advisory is available at:
http://www.microsoft.com/technet/security/bulletin/ms06-073.mspx
|
Vendor URL: www.microsoft.com/technet/security/bulletin/ms06-073.mspx (Links to External Site)
|
Cause:
Boundary error
|
Underlying OS: Windows (2000), Windows (2003), Windows (XP)
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|