Remote code execution vulnerability in Microsoft Visual Studio, Visual C++ Redistributable, Apple iTunes and Exchange serverID: oval:org.mitre.oval:def:7378 | Date: (C)2010-10-08 (M)2024-03-26 |
Class: VULNERABILITY | Family: windows |
The host is installed with Microsoft Visual Studio 2005, 2008, 2010 or Visual Studio .NET 2003 or Visual C++ 2005, Visual C++ 2008, Visual C++ 2010 Redistributable Package or Apple iTunes before 12.3 or Exchange server below 2016 Cu11 and is prone to remote code execution vulnerability. A flaw is present in the applications which is caused when applications built using MFC incorrectly restrict the path used for loading external libraries. Successful exploitation allows remote attacker to run arbitrary code as the logged-on user.
Platform: |
Microsoft Windows 11 |
Microsoft Windows Server 2022 |
Microsoft Windows 7 |
Microsoft Windows 8 |
Microsoft Windows Server 2003 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2019 |
Microsoft Windows 8.1 |
Microsoft Windows 10 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2012 R2 |
Product: |
Apple iTunes |
Microsoft Visual Studio |
Microsoft Exchange Server 2010 |
Microsoft Exchange Server 2013 |
Microsoft Exchange Server 2016 |
Microsoft Visual C++ 2005 Redistribution Pkg |
Microsoft Visual C++ 2008 Redistribution Pkg |
Microsoft Visual C++ 2010 Redistribution Pkg |