SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Microsoft Visual Basic Vendors:   Microsoft
Microsoft Visual Basic DataGrid/FlexGrid/Heirarchival FlexGrid/Windows Common/Charts ActiveX Controls Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1021369
SecurityTracker URL:  http://securitytracker.com/id/1021369
CVE Reference:   CVE-2008-4252, CVE-2008-4253, CVE-2008-4254, CVE-2008-4255, CVE-2008-4256   (Links to External Site)
Date:  Dec 9 2008
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6
Description:   Multiple vulnerabilities were reported in Microsoft Visual Basic in various ActiveX controls. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create specially crafted HTML or AVI content that, when loaded by the target user, will invoke an ActiveX control and execute arbitrary code on the target system. The code will run with the privileges of the target user.

The DataGrid ActiveX control is affected [CVE-2008-4252]. The CLSID of the vulnerable control is: cde57a43-8b86-11d0-b3c6-00a0c90aea82

The FlexGrid ActiveX control is affected [CVE-2008-4253]. The CLSID of the vulnerable control is: 6262d3a0-531b-11cf-91f6-c2863c385e30

The Hierarchical FlexGrid ActiveX control is affected [CVE-2008-4254]. The CLSID of the vulnerable control is: 0ECD9B64-23AA-11d0-B351-00A0C9055D8E

The Windows Common ActiveX control is affected by specially crafted AVI content [CVE-2008-4255]. The CLSID of the vulnerable control is: B09DE715-87C1-11d1-8BE3-0000F8754DA1

The Charts ActiveX control is affected [CVE-2008-4256]. The CLSID of the vulnerable control is: 3A2B370C-BA0A-11d1-B137-0000F8753F5D

ADLab of VenusTech, Jason Medeiros of Affiliated Computer Services, Carsten Eiram of Secunia Research, Mark Dowd, working with McAfee Avert Labs, Brett Moore of Insomnia Security, CHkr_D591, working with TippingPoint, Michal Bucko, working with CERT/CC, and Symantec s Security Intelligence Analysis Team reported these vulnerabilities.

Impact:   A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued the following fixes:

Microsoft Visual Basic 6.0 Runtime Extended Files:

http://www.microsoft.com/downloads/details.aspx?familyid=E27EEBCB-095D-43EC-A19E-4A46E591715C

Microsoft Visual Studio .NET 2002 Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=AFAD980D-7F27-49D9-AA23-B762C7B94CD6

Microsoft Visual Studio .NET 2003 Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=6AC7CF8F-D046-43A8-B4EF-253153D65AED

Microsoft Visual FoxPro 8.0 Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=A6977F81-F7F6-486B-96AD-8D296D79F205

Microsoft Visual FoxPro 9.0 Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=386D27A6-B2C7-4ACC-BF3E-EDCBC7358172

Microsoft Visual FoxPro 9.0 Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=5B1F28A9-DA8D-463A-8AE4-DFC8FCC6C41A

Microsoft Office FrontPage 2002 Service Pack 3:

http://www.microsoft.com/downloads/details.aspx?familyid=0a6130ae-c5b4-43cb-afe3-ab6a55b9d9ea

Microsoft Office Project 2003 Service Pack 3:

http://www.microsoft.com/downloads/details.aspx?familyid=89a44042-a629-40f3-800a-0bb45fc36591

Microsoft Office Project 2007:

http://www.microsoft.com/downloads/details.aspx?familyid=2fbf6a5b-ff35-4a2d-9fa0-4e62b6486fe6

A restart may be required.

The vendor's advisory is available at:

http://www.microsoft.com/technet/security/bulletin/ms08-070.mspx

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms08-070.mspx (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC