CVE-2009-2494

The Active Template Library (ATL) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via vectors related to erroneous free operations after reading a variant from a stream and deleting this variant, aka "ATL Object Type Mismatch Vulnerability."
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:-:x32:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:-:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x86:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*

History

21 Nov 2024, 01:05

Type Values Removed Values Added
References () http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx - () http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx -
References () http://osvdb.org/56910 - () http://osvdb.org/56910 -
References () http://secunia.com/advisories/36187 - Vendor Advisory () http://secunia.com/advisories/36187 - Vendor Advisory
References () http://www.securityfocus.com/bid/35982 - Patch () http://www.securityfocus.com/bid/35982 - Patch
References () http://www.securitytracker.com/id?1022712 - () http://www.securitytracker.com/id?1022712 -
References () http://www.us-cert.gov/cas/techalerts/TA09-223A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA09-223A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2009/2232 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/2232 - Vendor Advisory
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5708 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5708 -

07 Dec 2023, 18:38

Type Values Removed Values Added
CPE cpe:2.3:o:microsoft:windows_vista:*:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp1:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*

Information

Published : 2009-08-12 17:30

Updated : 2024-11-21 01:05


NVD link : CVE-2009-2494

Mitre link : CVE-2009-2494

CVE.ORG link : CVE-2009-2494


JSON object : View

Products Affected

microsoft

  • windows_vista
  • windows_xp
  • windows_2000
  • windows_server_2003
  • windows_server_2008
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')