Lucene search

K
saintSAINT CorporationSAINT:E5E9F70E1B7AAA88D827C4D32190B250
HistoryJul 30, 2009 - 12:00 a.m.

Visual Studio Active Template Library uninitialized object

2009-07-3000:00:00
SAINT Corporation
download.saintcorporation.com
21

0.945 High

EPSS

Percentile

99.2%

Added: 07/30/2009
CVE: CVE-2009-0901
BID: 35832
OSVDB: 56696

Background

Microsoft Visual Studio is a product to assist with software development in the Windows operating system. Visual Studio uses Microsoft Active Template Library (ATL), which is a set of template-based C++ classes, to help simplify the programming of Component Object Model (COM) objects.

Problem

A flaw in the way the Microsoft Active Template Library (ATL) handles certain ATL headers could allow an attacker to force VariantClear to be called on a VARIANT that has not been correctly initialized, leading to command execution when a user opens a specially crafted web page.

Resolution

Apply the patch referenced in Microsoft Security Bulletin 09-035.

References

<http://www.microsoft.com/technet/security/bulletin/ms09-035.mspx&gt;

Limitations

Exploit works on Microsoft Visual Studio 2005 and requires a user to load the exploit page in Internet Explorer 6 or 7. In order for the exploit to succeed, Internet Explorer must have the option β€œInitialize and script ActiveX controls not marked as safe” set to β€œEnable”, because the affected ActiveX control is marked not safe. Also note that, due to the nature of the vulnerability, the exploit only works when the exploit server is specified as an IP address rather than a host/domain name.

Platforms

Windows XP

0.945 High

EPSS

Percentile

99.2%