ATL Null String VulnerabilityID: oval:org.mitre.oval:def:7573 | Date: (C)2010-01-12 (M)2023-10-05 |
Class: VULNERABILITY | Family: windows |
The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold and SP1, and Visual C++ 2005 SP1 and 2008 Gold and SP1 does not properly enforce string termination, which allows remote attackers to obtain sensitive information via a crafted HTML document with an ATL (1) component or (2) control that triggers a buffer over-read, related to ATL headers and buffer allocation, aka "ATL Null String Vulnerability."
Platform: |
Microsoft Windows 2000 |
Microsoft Windows XP |
Microsoft Windows Server 2003 |
Microsoft Windows 10 |
Microsoft Windows Vista |
Microsoft Windows Server 2008 |
Microsoft Windows 7 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows 8 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows Server 2016 |
Microsoft Windows 11 |
Microsoft Windows Server 2019 |
Microsoft Windows Server 2022 |
Product: |
Microsoft Outlook 2002 |
Microsoft Outlook 2003 |
Microsoft Outlook 2007 |
Microsoft Visio Viewer 2002 |
Microsoft Office Visio Viewer 2003 |
Microsoft Office Visio Viewer 2007 |
Microsoft Visual Studio .NET 2003 |
Microsoft Visual Studio 2005 |
Microsoft Visual Studio 2008 |
Microsoft Visual C++ 2005 Redistributable Package |
Microsoft Visual C++ 2008 Redistributable Package |