CVE-2007-6255

Buffer overflow in the Microsoft HeartbeatCtl ActiveX control in HRTBEAT.OCX allows remote attackers to execute arbitrary code via the Host argument to an unspecified method.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
OR cpe:2.3:a:microsoft:internet_explorer:5.01:sp4:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:itanium:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_xp:-:*:*:*:professional:*:x64:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:itanium:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_xp:-:*:professional:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:professional:*:*:*:x64:*
cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*

History

21 Nov 2024, 00:39

Type Values Removed Values Added
References () http://osvdb.org/44652 - Broken Link () http://osvdb.org/44652 - Broken Link
References () http://www.kb.cert.org/vuls/id/570089 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/570089 - Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/28882 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/28882 - Third Party Advisory, VDB Entry
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-069 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-069 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/41940 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/41940 - Third Party Advisory, VDB Entry

Information

Published : 2008-04-23 13:05

Updated : 2024-11-21 00:39


NVD link : CVE-2007-6255

Mitre link : CVE-2007-6255

CVE.ORG link : CVE-2007-6255


JSON object : View

Products Affected

microsoft

  • windows_vista
  • windows_xp
  • windows_2000
  • windows_server_2003
  • internet_explorer
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer