CVE-2008-0015

Stack-based buffer overflow in the CComVariant::ReadFromStream function in the Active Template Library (ATL), as used in the MPEG2TuneRequest ActiveX control in msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted web page, as exploited in the wild in July 2009, aka "Microsoft Video ActiveX Control Vulnerability."
References
Link Resource
http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx
http://isc.sans.org/diary.html?storyid=6733 Exploit
http://osvdb.org/55651
http://secunia.com/advisories/36187
http://www.csis.dk/dk/nyheder/nyheder.asp?tekstID=799 Exploit
http://www.iss.net/threats/329.html Exploit
http://www.kb.cert.org/vuls/id/180513 US Government Resource
http://www.microsoft.com/technet/security/advisory/972890.mspx Vendor Advisory
http://www.securityfocus.com/bid/35558
http://www.securityfocus.com/bid/35585
http://www.securitytracker.com/id?1022514
http://www.us-cert.gov/cas/techalerts/TA09-187A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA09-195A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA09-223A.html US Government Resource
http://www.vupen.com/english/advisories/2009/2232
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-032
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6333
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6363
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7436
http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx
http://isc.sans.org/diary.html?storyid=6733 Exploit
http://osvdb.org/55651
http://secunia.com/advisories/36187
http://www.csis.dk/dk/nyheder/nyheder.asp?tekstID=799 Exploit
http://www.iss.net/threats/329.html Exploit
http://www.kb.cert.org/vuls/id/180513 US Government Resource
http://www.microsoft.com/technet/security/advisory/972890.mspx Vendor Advisory
http://www.securityfocus.com/bid/35558
http://www.securityfocus.com/bid/35585
http://www.securitytracker.com/id?1022514
http://www.us-cert.gov/cas/techalerts/TA09-187A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA09-195A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA09-223A.html US Government Resource
http://www.vupen.com/english/advisories/2009/2232
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-032
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6333
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6363
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7436
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:-:sp2:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:-:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*

History

21 Nov 2024, 00:40

Type Values Removed Values Added
References () http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx - () http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx -
References () http://isc.sans.org/diary.html?storyid=6733 - Exploit () http://isc.sans.org/diary.html?storyid=6733 - Exploit
References () http://osvdb.org/55651 - () http://osvdb.org/55651 -
References () http://secunia.com/advisories/36187 - () http://secunia.com/advisories/36187 -
References () http://www.csis.dk/dk/nyheder/nyheder.asp?tekstID=799 - Exploit () http://www.csis.dk/dk/nyheder/nyheder.asp?tekstID=799 - Exploit
References () http://www.iss.net/threats/329.html - Exploit () http://www.iss.net/threats/329.html - Exploit
References () http://www.kb.cert.org/vuls/id/180513 - US Government Resource () http://www.kb.cert.org/vuls/id/180513 - US Government Resource
References () http://www.microsoft.com/technet/security/advisory/972890.mspx - Vendor Advisory () http://www.microsoft.com/technet/security/advisory/972890.mspx - Vendor Advisory
References () http://www.securityfocus.com/bid/35558 - () http://www.securityfocus.com/bid/35558 -
References () http://www.securityfocus.com/bid/35585 - () http://www.securityfocus.com/bid/35585 -
References () http://www.securitytracker.com/id?1022514 - () http://www.securitytracker.com/id?1022514 -
References () http://www.us-cert.gov/cas/techalerts/TA09-187A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA09-187A.html - US Government Resource
References () http://www.us-cert.gov/cas/techalerts/TA09-195A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA09-195A.html - US Government Resource
References () http://www.us-cert.gov/cas/techalerts/TA09-223A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA09-223A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2009/2232 - () http://www.vupen.com/english/advisories/2009/2232 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-032 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-032 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6333 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6333 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6363 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6363 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7436 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7436 -

Information

Published : 2009-07-07 23:30

Updated : 2024-11-21 00:40


NVD link : CVE-2008-0015

Mitre link : CVE-2008-0015

CVE.ORG link : CVE-2008-0015


JSON object : View

Products Affected

microsoft

  • windows_2003_server
  • windows_xp
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer