[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-5559Date: (C)2006-10-27   (M)2023-12-22


The Execute method in the ADODB.Connection 2.7 and 2.8 ActiveX control objects (ADODB.Connection.2.7 and ADODB.Connection.2.8) in the Microsoft Data Access Components (MDAC) 2.5 SP3, 2.7 SP1, 2.8, and 2.8 SP1 does not properly track freed memory when the second argument is a BSTR, which allows remote attackers to cause a denial of service (Internet Explorer crash) and possibly execute arbitrary code via certain strings in the second and third arguments.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 9.3
Exploit Score: 8.6
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1017127
BID-20704
SECUNIA-22452
MILW0RM-2629
OSVDB-31882
ADV-2007-0578
IAVM:2007-A-0015
MS07-009
TA07-044A
VU#589272
http://blogs.technet.com/msrc/archive/2006/10/27/adodb-connection-poc-published.aspx
http://research.eeye.com/html/alerts/zeroday/20061027.html
ie-adodbconnection-Code-Execution(29837)

CPE    4
cpe:/a:microsoft:data_access_components:2.7:sp1
cpe:/a:microsoft:data_access_components:2.5:sp3
cpe:/a:microsoft:data_access_components:2.8:sp1
cpe:/a:microsoft:data_access_components:2.8
...
CWE    1
CWE-20
OVAL    1
oval:org.mitre.oval:def:214

© SecPod Technologies