Microsoft Visual Basic DataGrid/FlexGrid/Heirarchival FlexGrid/Windows Common/Charts ActiveX Controls Let Remote Users Execute Arbitrary Code
|
SecurityTracker Alert ID: 1021369 |
SecurityTracker URL: http://securitytracker.com/id/1021369
|
CVE Reference:
CVE-2008-4252, CVE-2008-4253, CVE-2008-4254, CVE-2008-4255, CVE-2008-4256
(Links to External Site)
|
Date: Dec 9 2008
|
Impact:
Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 6
|
Description:
Multiple vulnerabilities were reported in Microsoft Visual Basic in various ActiveX controls. A remote user can cause arbitrary code to be executed on the target user's system.
A remote user can create specially crafted HTML or AVI content that, when loaded by the target user, will invoke an ActiveX control and execute arbitrary code on the target system. The code will run with the privileges of the target user.
The DataGrid ActiveX control is affected [CVE-2008-4252]. The CLSID of the vulnerable control is: cde57a43-8b86-11d0-b3c6-00a0c90aea82
The FlexGrid ActiveX control is affected [CVE-2008-4253]. The CLSID of the vulnerable control is: 6262d3a0-531b-11cf-91f6-c2863c385e30
The Hierarchical FlexGrid ActiveX control is affected [CVE-2008-4254]. The CLSID of the vulnerable control is: 0ECD9B64-23AA-11d0-B351-00A0C9055D8E
The Windows Common ActiveX control is affected by specially crafted AVI content [CVE-2008-4255]. The CLSID of the vulnerable control is: B09DE715-87C1-11d1-8BE3-0000F8754DA1
The Charts ActiveX control is affected [CVE-2008-4256]. The CLSID of the vulnerable control is: 3A2B370C-BA0A-11d1-B137-0000F8753F5D
ADLab of VenusTech, Jason Medeiros of Affiliated Computer Services, Carsten Eiram of Secunia Research, Mark Dowd, working with McAfee Avert Labs, Brett Moore of Insomnia Security, CHkr_D591, working with TippingPoint, Michal Bucko, working with CERT/CC, and Symantec s Security Intelligence Analysis Team reported these vulnerabilities.
|
Impact:
A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.
|
Solution:
The vendor has issued the following fixes:
Microsoft Visual Basic 6.0 Runtime Extended Files:
http://www.microsoft.com/downloads/details.aspx?familyid=E27EEBCB-095D-43EC-A19E-4A46E591715C
Microsoft Visual Studio .NET 2002 Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?familyid=AFAD980D-7F27-49D9-AA23-B762C7B94CD6
Microsoft Visual Studio .NET 2003 Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?familyid=6AC7CF8F-D046-43A8-B4EF-253153D65AED
Microsoft Visual FoxPro 8.0 Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?familyid=A6977F81-F7F6-486B-96AD-8D296D79F205
Microsoft Visual FoxPro 9.0 Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?familyid=386D27A6-B2C7-4ACC-BF3E-EDCBC7358172
Microsoft Visual FoxPro 9.0 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=5B1F28A9-DA8D-463A-8AE4-DFC8FCC6C41A
Microsoft Office FrontPage 2002 Service Pack 3:
http://www.microsoft.com/downloads/details.aspx?familyid=0a6130ae-c5b4-43cb-afe3-ab6a55b9d9ea
Microsoft Office Project 2003 Service Pack 3:
http://www.microsoft.com/downloads/details.aspx?familyid=89a44042-a629-40f3-800a-0bb45fc36591
Microsoft Office Project 2007:
http://www.microsoft.com/downloads/details.aspx?familyid=2fbf6a5b-ff35-4a2d-9fa0-4e62b6486fe6
A restart may be required.
The vendor's advisory is available at:
http://www.microsoft.com/technet/security/bulletin/ms08-070.mspx
|
Vendor URL: www.microsoft.com/technet/security/bulletin/ms08-070.mspx (Links to External Site)
|
Cause:
Access control error, Boundary error
|
Underlying OS: Windows (Any)
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|