CVE-2005-2127 (GCVE-0-2005-2127)
Vulnerability from cvelistv5
Published
2005-08-19 04:00
Modified
2024-08-07 22:15
Severity ?
CWE
  • n/a
Summary
Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."
References
secure@microsoft.com http://isc.sans.org/diary.php?date=2005-08-18 Third Party Advisory
secure@microsoft.com http://secunia.com/advisories/16480 Patch, Vendor Advisory
secure@microsoft.com http://secunia.com/advisories/17172 Permissions Required, Third Party Advisory
secure@microsoft.com http://secunia.com/advisories/17223 Permissions Required, Third Party Advisory
secure@microsoft.com http://secunia.com/advisories/17509 Permissions Required, Third Party Advisory
secure@microsoft.com http://securityreason.com/securityalert/72 Third Party Advisory
secure@microsoft.com http://securitytracker.com/id?1014727 Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
secure@microsoft.com http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf Third Party Advisory
secure@microsoft.com http://www.kb.cert.org/vuls/id/740372 Third Party Advisory, US Government Resource
secure@microsoft.com http://www.kb.cert.org/vuls/id/898241 Third Party Advisory, US Government Resource
secure@microsoft.com http://www.kb.cert.org/vuls/id/959049 Third Party Advisory, US Government Resource
secure@microsoft.com http://www.microsoft.com/technet/security/advisory/906267.mspx Mitigation, Patch, Vendor Advisory
secure@microsoft.com http://www.securityfocus.com/archive/1/470690/100/0/threaded
secure@microsoft.com http://www.securityfocus.com/bid/14594 Exploit, Patch, Third Party Advisory, VDB Entry
secure@microsoft.com http://www.securityfocus.com/bid/15061 Third Party Advisory, VDB Entry
secure@microsoft.com http://www.us-cert.gov/cas/techalerts/TA05-284A.html Third Party Advisory, US Government Resource
secure@microsoft.com http://www.us-cert.gov/cas/techalerts/TA05-347A.html Third Party Advisory, US Government Resource
secure@microsoft.com http://www.us-cert.gov/cas/techalerts/TA06-220A.html Third Party Advisory, US Government Resource
secure@microsoft.com http://www.vupen.com/english/advisories/2005/1450 Broken Link
secure@microsoft.com https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-052
secure@microsoft.com https://exchange.xforce.ibmcloud.com/vulnerabilities/21895 VDB Entry
secure@microsoft.com https://exchange.xforce.ibmcloud.com/vulnerabilities/34754 VDB Entry
secure@microsoft.com https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1155
secure@microsoft.com https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1454
secure@microsoft.com https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1464
secure@microsoft.com https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1468
secure@microsoft.com https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1535
secure@microsoft.com https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1538
af854a3a-2127-422b-91ae-364da2661108 http://isc.sans.org/diary.php?date=2005-08-18 Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/16480 Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/17172 Permissions Required, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/17223 Permissions Required, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/17509 Permissions Required, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108 http://securityreason.com/securityalert/72 Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108 http://securitytracker.com/id?1014727 Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.kb.cert.org/vuls/id/740372 Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108 http://www.kb.cert.org/vuls/id/898241 Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108 http://www.kb.cert.org/vuls/id/959049 Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108 http://www.microsoft.com/technet/security/advisory/906267.mspx Mitigation, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/archive/1/470690/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/14594 Exploit, Patch, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/15061 Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108 http://www.us-cert.gov/cas/techalerts/TA05-284A.html Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108 http://www.us-cert.gov/cas/techalerts/TA05-347A.html Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108 http://www.us-cert.gov/cas/techalerts/TA06-220A.html Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108 http://www.vupen.com/english/advisories/2005/1450 Broken Link
af854a3a-2127-422b-91ae-364da2661108 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-052
af854a3a-2127-422b-91ae-364da2661108 https://exchange.xforce.ibmcloud.com/vulnerabilities/21895 VDB Entry
af854a3a-2127-422b-91ae-364da2661108 https://exchange.xforce.ibmcloud.com/vulnerabilities/34754 VDB Entry
af854a3a-2127-422b-91ae-364da2661108 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1155
af854a3a-2127-422b-91ae-364da2661108 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1454
af854a3a-2127-422b-91ae-364da2661108 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1464
af854a3a-2127-422b-91ae-364da2661108 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1468
af854a3a-2127-422b-91ae-364da2661108 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1535
af854a3a-2127-422b-91ae-364da2661108 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1538
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:15:37.364Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#959049",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/959049"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://isc.sans.org/diary.php?date=2005-08-18"
          },
          {
            "name": "20070606 IE 6/Microsoft Html Popup Window (mshtml.dll) DoS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/470690/100/0/threaded"
          },
          {
            "name": "72",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/72"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf"
          },
          {
            "name": "TA05-347A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA05-347A.html"
          },
          {
            "name": "MS05-052",
            "tags": [
              "vendor-advisory",
              "x_refsource_MS",
              "x_transferred"
            ],
            "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-052"
          },
          {
            "name": "15061",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15061"
          },
          {
            "name": "17223",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17223"
          },
          {
            "name": "oval:org.mitre.oval:def:1454",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1454"
          },
          {
            "name": "16480",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16480"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.microsoft.com/technet/security/advisory/906267.mspx"
          },
          {
            "name": "microsoft-ie-mshtml-dos(34754)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34754"
          },
          {
            "name": "17172",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17172"
          },
          {
            "name": "oval:org.mitre.oval:def:1538",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1538"
          },
          {
            "name": "Win-msdss-command-execution(21895)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21895"
          },
          {
            "name": "oval:org.mitre.oval:def:1535",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1535"
          },
          {
            "name": "14594",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14594"
          },
          {
            "name": "oval:org.mitre.oval:def:1468",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1468"
          },
          {
            "name": "17509",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17509"
          },
          {
            "name": "TA06-220A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA06-220A.html"
          },
          {
            "name": "oval:org.mitre.oval:def:1464",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1464"
          },
          {
            "name": "VU#740372",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/740372"
          },
          {
            "name": "VU#898241",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/898241"
          },
          {
            "name": "1014727",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014727"
          },
          {
            "name": "TA05-284A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA05-284A.html"
          },
          {
            "name": "ADV-2005-1450",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/1450"
          },
          {
            "name": "oval:org.mitre.oval:def:1155",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1155"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the \"COM Object Instantiation Memory Corruption vulnerability.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
        "shortName": "microsoft"
      },
      "references": [
        {
          "name": "VU#959049",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/959049"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://isc.sans.org/diary.php?date=2005-08-18"
        },
        {
          "name": "20070606 IE 6/Microsoft Html Popup Window (mshtml.dll) DoS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/470690/100/0/threaded"
        },
        {
          "name": "72",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/72"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf"
        },
        {
          "name": "TA05-347A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA05-347A.html"
        },
        {
          "name": "MS05-052",
          "tags": [
            "vendor-advisory",
            "x_refsource_MS"
          ],
          "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-052"
        },
        {
          "name": "15061",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15061"
        },
        {
          "name": "17223",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17223"
        },
        {
          "name": "oval:org.mitre.oval:def:1454",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1454"
        },
        {
          "name": "16480",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16480"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.microsoft.com/technet/security/advisory/906267.mspx"
        },
        {
          "name": "microsoft-ie-mshtml-dos(34754)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34754"
        },
        {
          "name": "17172",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17172"
        },
        {
          "name": "oval:org.mitre.oval:def:1538",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1538"
        },
        {
          "name": "Win-msdss-command-execution(21895)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21895"
        },
        {
          "name": "oval:org.mitre.oval:def:1535",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1535"
        },
        {
          "name": "14594",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14594"
        },
        {
          "name": "oval:org.mitre.oval:def:1468",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1468"
        },
        {
          "name": "17509",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17509"
        },
        {
          "name": "TA06-220A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA06-220A.html"
        },
        {
          "name": "oval:org.mitre.oval:def:1464",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1464"
        },
        {
          "name": "VU#740372",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/740372"
        },
        {
          "name": "VU#898241",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/898241"
        },
        {
          "name": "1014727",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014727"
        },
        {
          "name": "TA05-284A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA05-284A.html"
        },
        {
          "name": "ADV-2005-1450",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/1450"
        },
        {
          "name": "oval:org.mitre.oval:def:1155",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1155"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@microsoft.com",
          "ID": "CVE-2005-2127",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the \"COM Object Instantiation Memory Corruption vulnerability.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#959049",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/959049"
            },
            {
              "name": "http://isc.sans.org/diary.php?date=2005-08-18",
              "refsource": "MISC",
              "url": "http://isc.sans.org/diary.php?date=2005-08-18"
            },
            {
              "name": "20070606 IE 6/Microsoft Html Popup Window (mshtml.dll) DoS",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/470690/100/0/threaded"
            },
            {
              "name": "72",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/72"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf"
            },
            {
              "name": "TA05-347A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA05-347A.html"
            },
            {
              "name": "MS05-052",
              "refsource": "MS",
              "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-052"
            },
            {
              "name": "15061",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15061"
            },
            {
              "name": "17223",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17223"
            },
            {
              "name": "oval:org.mitre.oval:def:1454",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1454"
            },
            {
              "name": "16480",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16480"
            },
            {
              "name": "http://www.microsoft.com/technet/security/advisory/906267.mspx",
              "refsource": "MISC",
              "url": "http://www.microsoft.com/technet/security/advisory/906267.mspx"
            },
            {
              "name": "microsoft-ie-mshtml-dos(34754)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34754"
            },
            {
              "name": "17172",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17172"
            },
            {
              "name": "oval:org.mitre.oval:def:1538",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1538"
            },
            {
              "name": "Win-msdss-command-execution(21895)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21895"
            },
            {
              "name": "oval:org.mitre.oval:def:1535",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1535"
            },
            {
              "name": "14594",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14594"
            },
            {
              "name": "oval:org.mitre.oval:def:1468",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1468"
            },
            {
              "name": "17509",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17509"
            },
            {
              "name": "TA06-220A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA06-220A.html"
            },
            {
              "name": "oval:org.mitre.oval:def:1464",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1464"
            },
            {
              "name": "VU#740372",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/740372"
            },
            {
              "name": "VU#898241",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/898241"
            },
            {
              "name": "1014727",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014727"
            },
            {
              "name": "TA05-284A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA05-284A.html"
            },
            {
              "name": "ADV-2005-1450",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/1450"
            },
            {
              "name": "oval:org.mitre.oval:def:1155",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1155"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
    "assignerShortName": "microsoft",
    "cveId": "CVE-2005-2127",
    "datePublished": "2005-08-19T04:00:00",
    "dateReserved": "2005-07-02T00:00:00",
    "dateUpdated": "2024-08-07T22:15:37.364Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2005-2127\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2005-08-19T04:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the \\\"COM Object Instantiation Memory Corruption vulnerability.\\\"\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":true,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ati:catalyst_driver:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62E822DD-6123-4CD8-9FE4-BC8A91D94F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:.net_framework:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A927C9E-5CCC-4FC1-AE63-24B96A5FC51A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:.net_framework:1.1:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BF6AE15-EAC3-4100-A742-211026C79CCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:.net_framework:1.1:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2804E22-FFF4-4301-8958-16B32CE5ECD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:.net_framework:1.1:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B33B1B47-EEA0-4B1F-AC03-CAB56AB42DC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49AD45BF-8A91-4C87-AF15-D38D8468A4C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9A82D13-513C-46FA-AF51-0582233E230A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:2000:*:*:ja:*:*:*:*\",\"matchCriteriaId\":\"757EC6C1-F5E2-45CD-9F7F-7760ECEDC842\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:2000:*:*:ko:*:*:*:*\",\"matchCriteriaId\":\"59B1B68C-86F1-4FA4-9F82-3E8761ED1E74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:2000:*:*:zh:*:*:*:*\",\"matchCriteriaId\":\"716DDA05-D094-4837-852C-0511CDDD5ABC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:2000:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C54DDAF-8D7F-4A7D-9186-6048D4C850B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:2000:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"67388076-420D-4327-A436-329177EA6F42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"4891122F-AD7F-45E6-98C6-833227916F6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:xp:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AB85A3C-EFA3-485D-84C5-7976718AEAE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:xp:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D02D769-061D-44A5-B019-F4E653DF615A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"79BA1175-7F02-4435-AEA6-1BA8AADEB7EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:project:98:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77BFDC2A-4AE1-4FC8-ABA7-0400D46EA587\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:project:2000:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F09162C-01F0-4056-94D3-995713F92AE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:project:2002:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AE2D3E0-49E4-410E-B63A-753BDE8995BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:project:2002:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B14AE8E-1BFF-4458-87CC-357957F18F8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:project:2003:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34EFAEFE-2BDE-4111-91F5-E9F75ADFA920\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:project:2003:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC1DA2B8-C41B-4EB9-A58F-E4E63F695A55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visio:2000:sr1:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"B4EC96E0-8D7C-4C72-8F04-97B0B675306E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visio:2002:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E24DF34-F4A8-4C28-9593-F019FE3E3BA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visio:2002:*:*:*:professional:*:*:*\",\"matchCriteriaId\":\"FF41DACB-D707-4ED3-BA2E-2EEABC17FC4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visio:2002:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"70D447B9-4604-447C-88FC-F5DC8F77603C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visio:2002:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0D2C5C3-225C-49DC-B9C7-C5BC05900F2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visio:2002:sp2:*:*:professional:*:*:*\",\"matchCriteriaId\":\"F6E69C81-2894-4319-9FBD-60AE719942E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visio:2002:sp2:*:*:standard:*:*:*\",\"matchCriteriaId\":\"8BC60369-95D2-475B-9FDA-5D1C13FEE8DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visio:2003:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"511E22C6-DB04-44A0-906D-F432DD42CA5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visio:2003:*:*:*:professional:*:*:*\",\"matchCriteriaId\":\"9BF7D109-38E6-4FEE-8F9B-9A481D50DCFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visio:2003:*:*:*:standard:*:*:*\",\"matchCriteriaId\":\"3D931561-2312-4770-B418-FB622856DF34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visio:2003:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FBEFBED-72F3-447B-8164-9E5C16828484\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_.net:2002:gold:*:*:*:*:*:*\",\"matchCriteriaId\":\"E17BD019-DD35-413E-ACBA-2E77C8A1247D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_.net:2003:*:*:*:enterprise_architect:*:*:*\",\"matchCriteriaId\":\"A681100F-9DE5-4BE6-ADE9-64A3808C7CDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_.net:2003:gold:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9E6C132-4F4B-4FB0-9DDC-DD9750D8552D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:academic:*:*:*\",\"matchCriteriaId\":\"AEC99110-8EC1-4FEC-9535-B27AF1965DBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:enterprise_architect:*:*:*\",\"matchCriteriaId\":\"B35FE238-4380-41C7-A956-EA3F2D5F9159\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:enterprise_developer:*:*:*\",\"matchCriteriaId\":\"A8E772B4-8E7D-4D35-8C59-5959123AA572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:professional:*:*:*\",\"matchCriteriaId\":\"4AFEC24E-5FA5-4653-BBAA-AFEBCC3F149B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:trial:*:*:*\",\"matchCriteriaId\":\"D451D000-00DC-46A9-9D1E-2C715D6D1787\"}]}]}],\"references\":[{\"url\":\"http://isc.sans.org/diary.php?date=2005-08-18\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/16480\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/17172\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/17223\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/17509\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/72\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://securitytracker.com/id?1014727\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\",\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/740372\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/898241\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/959049\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.microsoft.com/technet/security/advisory/906267.mspx\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Mitigation\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/470690/100/0/threaded\",\"source\":\"secure@microsoft.com\"},{\"url\":\"http://www.securityfocus.com/bid/14594\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/15061\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA05-284A.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA05-347A.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA06-220A.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2005/1450\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-052\",\"source\":\"secure@microsoft.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/21895\",\"source\":\"secure@microsoft.com\",\"tags\":[\"VDB Entry\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/34754\",\"source\":\"secure@microsoft.com\",\"tags\":[\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1155\",\"source\":\"secure@microsoft.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1454\",\"source\":\"secure@microsoft.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1464\",\"source\":\"secure@microsoft.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1468\",\"source\":\"secure@microsoft.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1535\",\"source\":\"secure@microsoft.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1538\",\"source\":\"secure@microsoft.com\"},{\"url\":\"http://isc.sans.org/diary.php?date=2005-08-18\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/16480\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/17172\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/17223\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/17509\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/72\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://securitytracker.com/id?1014727\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\",\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/740372\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/898241\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/959049\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.microsoft.com/technet/security/advisory/906267.mspx\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/470690/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/14594\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/15061\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA05-284A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA05-347A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA06-220A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2005/1450\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-052\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/21895\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"VDB Entry\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/34754\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1155\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1454\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1464\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1468\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1535\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1538\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…