CVE-2006-5559

The Execute method in the ADODB.Connection 2.7 and 2.8 ActiveX control objects (ADODB.Connection.2.7 and ADODB.Connection.2.8) in the Microsoft Data Access Components (MDAC) 2.5 SP3, 2.7 SP1, 2.8, and 2.8 SP1 does not properly track freed memory when the second argument is a BSTR, which allows remote attackers to cause a denial of service (Internet Explorer crash) and possibly execute arbitrary code via certain strings in the second and third arguments.
References
Link Resource
http://blogs.technet.com/msrc/archive/2006/10/27/adodb-connection-poc-published.aspx
http://research.eeye.com/html/alerts/zeroday/20061027.html Patch
http://secunia.com/advisories/22452 Vendor Advisory
http://securitytracker.com/id?1017127 Exploit Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/589272 Patch US Government Resource
http://www.osvdb.org/31882
http://www.securityfocus.com/bid/20704 Exploit Patch
http://www.us-cert.gov/cas/techalerts/TA07-044A.html US Government Resource
http://www.vupen.com/english/advisories/2007/0578 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-009
https://exchange.xforce.ibmcloud.com/vulnerabilities/29837
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A214
http://blogs.technet.com/msrc/archive/2006/10/27/adodb-connection-poc-published.aspx
http://research.eeye.com/html/alerts/zeroday/20061027.html Patch
http://secunia.com/advisories/22452 Vendor Advisory
http://securitytracker.com/id?1017127 Exploit Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/589272 Patch US Government Resource
http://www.osvdb.org/31882
http://www.securityfocus.com/bid/20704 Exploit Patch
http://www.us-cert.gov/cas/techalerts/TA07-044A.html US Government Resource
http://www.vupen.com/english/advisories/2007/0578 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-009
https://exchange.xforce.ibmcloud.com/vulnerabilities/29837
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A214
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
cpe:2.3:a:microsoft:data_access_components:2.5:sp3:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:data_access_components:2.8:sp1:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:itanium:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:data_access_components:2.8:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
cpe:2.3:a:microsoft:data_access_components:2.7:sp1:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
cpe:2.3:a:microsoft:data_access_components:2.8:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
cpe:2.3:a:microsoft:data_access_components:2.8:sp1:*:*:*:*:*:*

History

21 Nov 2024, 00:19

Type Values Removed Values Added
References () http://blogs.technet.com/msrc/archive/2006/10/27/adodb-connection-poc-published.aspx - () http://blogs.technet.com/msrc/archive/2006/10/27/adodb-connection-poc-published.aspx -
References () http://research.eeye.com/html/alerts/zeroday/20061027.html - Patch () http://research.eeye.com/html/alerts/zeroday/20061027.html - Patch
References () http://secunia.com/advisories/22452 - Vendor Advisory () http://secunia.com/advisories/22452 - Vendor Advisory
References () http://securitytracker.com/id?1017127 - Exploit, Patch, Vendor Advisory () http://securitytracker.com/id?1017127 - Exploit, Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/589272 - Patch, US Government Resource () http://www.kb.cert.org/vuls/id/589272 - Patch, US Government Resource
References () http://www.osvdb.org/31882 - () http://www.osvdb.org/31882 -
References () http://www.securityfocus.com/bid/20704 - Exploit, Patch () http://www.securityfocus.com/bid/20704 - Exploit, Patch
References () http://www.us-cert.gov/cas/techalerts/TA07-044A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA07-044A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2007/0578 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/0578 - Vendor Advisory
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-009 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-009 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/29837 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/29837 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A214 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A214 -

Information

Published : 2006-10-27 16:07

Updated : 2024-11-21 00:19


NVD link : CVE-2006-5559

Mitre link : CVE-2006-5559

CVE.ORG link : CVE-2006-5559


JSON object : View

Products Affected

microsoft

  • windows_2000
  • windows_2003_server
  • windows_xp
  • data_access_components
CWE
CWE-20

Improper Input Validation