ATL COM Initialization VulnerabilityID: oval:org.mitre.oval:def:6716 | Date: (C)2009-12-26 (M)2023-12-14 |
Class: VULNERABILITY | Family: windows |
The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold and SP1, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2; does not properly restrict use of OleLoadFromStream in instantiating objects from data streams, which allows remote attackers to execute arbitrary code via a crafted HTML document with an ATL (1) component or (2) control, related to ATL headers and bypassing security policies, aka "ATL COM Initialization Vulnerability."
Platform: |
Microsoft Windows 2000 |
Microsoft Windows XP |
Microsoft Windows Vista |
Microsoft Windows 7 |
Microsoft Windows Server 2003 |
Microsoft Windows 10 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows 8 |
Microsoft Windows Server 2012 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows Server 2016 |
Microsoft Windows 11 |
Microsoft Windows Server 2019 |
Microsoft Windows Server 2022 |
Product: |
Microsoft Outlook 2002 |
Microsoft Outlook 2003 |
Microsoft Outlook 2007 |
Microsoft Visio Viewer 2002 |
Microsoft Office Visio Viewer 2003 |
Microsoft Office Visio Viewer 2007 |
Microsoft Internet Explorer |
Microsoft Visual Studio .NET 2003 |
Microsoft Visual Studio 2005 |
Microsoft Visual Studio 2008 |
Microsoft Visual C++ 2005 Redistributable Package |
Microsoft Visual C++ 2008 Redistributable Package |
Microsoft Outlook Express |
Windows Media Player |