National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2009-2493 Detail

Description

The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold and SP1, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2; does not properly restrict use of OleLoadFromStream in instantiating objects from data streams, which allows remote attackers to execute arbitrary code via a crafted HTML document with an ATL (1) component or (2) control, related to ATL headers and bypassing security policies, aka "ATL COM Initialization Vulnerability."

Source:  MITRE
Description Last Modified:  07/29/2009

Impact

CVSS v2.0 Severity and Metrics:

Base Score: 9.3 HIGH
Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C) (V2 legend)
Impact Subscore: 10.0
Exploitability Subscore: 8.6


Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (AU): None
Confidentiality (C): Complete
Integrity (I): Complete
Availability (A): Complete
Additional Information:
Victim must voluntarily interact with attack mechanism
Allows unauthorized disclosure of information
Allows unauthorized modification
Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx Broken Link
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html Third Party Advisory
http://marc.info/?l=bugtraq&m=126592505426855&w=2 Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-66-264648-1 Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-66-266108-1 Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020775.1-1 Broken Link
http://www.adobe.com/support/security/advisories/apsa09-04.html Patch Third Party Advisory
http://www.adobe.com/support/security/bulletins/apsb09-10.html Third Party Advisory
http://www.adobe.com/support/security/bulletins/apsb09-11.html Patch Third Party Advisory
http://www.adobe.com/support/security/bulletins/apsb09-13.html Third Party Advisory
http://www.novell.com/support/viewContent.do?externalId=7004997&sliceId=1 Third Party Advisory
http://www.openoffice.org/security/cves/CVE-2009-2493.html Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA09-195A.html Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA09-223A.html Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA09-286A.html Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA09-342A.html Third Party Advisory US Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-035
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-055
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-060
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-072
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6245
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6304
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6421
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6473
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6621
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6716

References to Check Content

Identifier:
oval:org.mitre.oval:def:6245
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:6245
Identifier:
oval:org.mitre.oval:def:6304
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:6304
Identifier:
oval:org.mitre.oval:def:6421
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:6421
Identifier:
oval:org.mitre.oval:def:6473
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:6473
Identifier:
oval:org.mitre.oval:def:6621
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:6621
Identifier:
oval:org.mitre.oval:def:6716
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:6716

Technical Details

Vulnerability Type (View All)

  • Permissions, Privileges, and Access Control (CWE-264)

Change History

5 change records found - show changes

Quick Info

CVE Dictionary Entry:
CVE-2009-2493
NVD Published Date:
07/29/2009
NVD Last Modified:
10/12/2018