TUCoPS :: Browsers :: v7-1702.htm

Microsoft IE Devenum.dll COM Instantiation Remote Code Execution vuln
NSFOCUS SA2005-02 : Microsoft IE Devenum.dll COM Instantiation Remote Code Execution Vulnerability
NSFOCUS SA2005-02 : Microsoft IE Devenum.dll COM Instantiation Remote Code Execution Vulnerability



--nextPart8058647.44ls0mMM5d
Content-Type: text/plain;
  charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

NSFOCUS Security Advisory(SA2005-02)

Topic: Microsoft IE Devenum.dll COM Instantiation Remote Code Execution Vulnerability

Release Date: 2005-08-10

CVE CAN ID: CAN-2005-1990

http://www.nsfocus.com/english/homepage/research/0502.htm 

Affected systems & software
==========================
Microsoft Internet Explorer 5.01 SP4
Microsoft Internet Explorer 5.5 SP2
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6 SP1

Unaffected systems & software
============================

Description
===========
NSFocus Security Team discovered a security vulnerability in Microsoft Internet 
Explorer. By crafting a malicious HTML page and alluring users to visit it, 
a remote attacker can execute arbitrary code with the privilege of the user=2E 

Internet Explorer does not properly call interface arguments when instantiating
COM component in devenum.dll, resulting in exceptional memory access which 
might cause IE to crash. Carefully crafted HTML page might allow a remote 
attacker to execute arbitrary code. 

Workaround
============
Disable ActiveX control in Internet Explorer.

Vendor Status
=============
2005.07.13  Informed the vendor.
2005.07.16  The vendor confirmed the vulnerability
2005.08.09  The vendor releases a security bulletin (MS05-038) and related 
            patches.

Detail Microsoft Security Bulletin is available at:
http://www.microsoft.com/technet/security/bulletin/MS05-038.mspx 

Additional Information
=======================
The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CAN-2005-1990 to this issue. This is a candidate for inclusion in the 
CVE list (http://cve.mitre.org), which standardizes names for security problems. 
Candidates may change significantly before they become official CVE entries.

Acknowledgment
==============
Hu Qianwei of NSFOCUS Security Team found the vulnerability.

DISCLAIMS
=========THE INFORMATION PROVIDED IS RELEASED BY NSFOCUS "AS IS" WITHOUT WARRANTY
OF ANY KIND. NSFOCUS DISCLAIMS ALL WARRANTIES, EITHER EXPRESSED OR IMPLIED,
EXCEPT FOR THE WARRANTIES OF MERCHANTABILITY. IN NO EVENT SHALL NSFOCUS
BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL,CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES,
EVEN IF NSFOCUS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
DISTRIBUTION OR REPRODUCTION OF THE INFORMATION IS PROVIDED THAT THE
ADVISORY IS NOT MODIFIED IN ANY WAY.

Copyright 1999-2005 NSFOCUS. All Rights Reserved. Terms of use.


NSFOCUS Security Team  
NSFOCUS INFORMATION TECHNOLOGY CO.,LTD
(http://www.nsfocus.com) 

PGP Key: http://www.nsfocus.com/homepage/research/pgpkey.asc 
Key fingerprint = F8F2 F5D1 EF74 E08C 02FE 1B90 D7BF 7877 C6A6 F6DA


--nextPart8058647.44ls0mMM5d
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQBC+W4w1794d8am9toRAgULAJ4zxYdN4KGZeEZ3Zc++sJbiHIGVUACdE4Tk
pHv15Bl2qniH8tPrqzeQ/RM=sRzf
-----END PGP SIGNATURE-----

--nextPart8058647.44ls0mMM5d--

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH