ID |
CVE-2007-2216
|
Summary |
The tblinf32.dll (aka vstlbinf.dll) ActiveX control for Internet Explorer 5.01, 6 SP1, and 7 uses an incorrect IObjectsafety implementation, which allows remote attackers to execute arbitrary code by requesting the HelpString property, involving a crafted DLL file argument to the TypeLibInfoFromFile function, which overwrites the HelpStringDll property to call the DLLGetDocumentation function in another DLL file, aka "ActiveX Object Vulnerability." |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*
-
cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*
-
cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
|
CVSS |
Base: | 9.3 (as of 23-07-2021 - 15:04) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-16 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
oval
via4
|
accepted | 2014-02-24T04:00:47.730-05:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Jeff Cheng | organization | Opsware, Inc. |
name | Jeff Cheng | organization | Opsware, Inc. |
name | Jeff Cheng | organization | Opsware, Inc. |
name | Jeff Cheng | organization | Opsware, Inc. |
name | Jeff Cheng | organization | Opsware, Inc. |
name | Jeff Cheng | organization | Opsware, Inc. |
name | Jeff Cheng | organization | Opsware, Inc. |
name | Chandan S | organization | SecPod Technologies |
name | Maria Mikhno | organization | ALTX-SOFT |
| definition_extensions | comment | Microsoft Windows 2000 SP4 or later is installed | oval | oval:org.mitre.oval:def:229 |
comment | Microsoft Internet Explorer 5.01 SP4 is installed | oval | oval:org.mitre.oval:def:325 |
comment | Microsoft Windows 2000 SP4 or later is installed | oval | oval:org.mitre.oval:def:229 |
comment | Microsoft Windows XP SP2 or later is installed | oval | oval:org.mitre.oval:def:521 |
comment | Microsoft Internet Explorer 6 is installed | oval | oval:org.mitre.oval:def:563 |
comment | Microsoft Windows Server 2003 SP1 (x86) is installed | oval | oval:org.mitre.oval:def:565 |
comment | Microsoft Windows Server 2003 (x64) is installed | oval | oval:org.mitre.oval:def:730 |
comment | Microsoft Windows Server 2003 SP1 for Itanium is installed | oval | oval:org.mitre.oval:def:1205 |
comment | Microsoft Internet Explorer 6 is installed | oval | oval:org.mitre.oval:def:563 |
comment | Microsoft Windows Server 2003 SP2 (x86) is installed | oval | oval:org.mitre.oval:def:1935 |
comment | Microsoft Windows Server 2003 SP2 (x64) is installed | oval | oval:org.mitre.oval:def:2161 |
comment | Microsoft Windows Server 2003 (ia64) SP2 is installed | oval | oval:org.mitre.oval:def:1442 |
comment | Microsoft Internet Explorer 6 is installed | oval | oval:org.mitre.oval:def:563 |
comment | Microsoft Windows XP SP1 (64-bit) is installed | oval | oval:org.mitre.oval:def:480 |
comment | Microsoft Internet Explorer 6 is installed | oval | oval:org.mitre.oval:def:563 |
comment | Microsoft Internet Explorer 6 is installed | oval | oval:org.mitre.oval:def:563 |
comment | Microsoft Windows XP x64 Edition SP2 is installed | oval | oval:org.mitre.oval:def:4193 |
comment | Microsoft Windows XP SP2 or later is installed | oval | oval:org.mitre.oval:def:521 |
comment | Microsoft Windows XP SP1 (64-bit) is installed | oval | oval:org.mitre.oval:def:480 |
comment | Microsoft Windows Server 2003 SP1 (x86) is installed | oval | oval:org.mitre.oval:def:565 |
comment | Microsoft Windows Server 2003 SP2 (x86) is installed | oval | oval:org.mitre.oval:def:1935 |
comment | Microsoft Windows XP x64 Edition SP2 is installed | oval | oval:org.mitre.oval:def:4193 |
comment | Microsoft Internet Explorer 7 is installed | oval | oval:org.mitre.oval:def:627 |
comment | Microsoft Windows Vista is installed | oval | oval:org.mitre.oval:def:228 |
comment | Microsoft Internet Explorer 7 is installed | oval | oval:org.mitre.oval:def:627 |
| description | The tblinf32.dll (aka vstlbinf.dll) ActiveX control for Internet Explorer 5.01, 6 SP1, and 7 uses an incorrect IObjectsafety implementation, which allows remote attackers to execute arbitrary code by requesting the HelpString property, involving a crafted DLL file argument to the TypeLibInfoFromFile function, which overwrites the HelpStringDll property to call the DLLGetDocumentation function in another DLL file, aka "ActiveX Object Vulnerability." | family | windows | id | oval:org.mitre.oval:def:2109 | status | accepted | submitted | 2007-08-15T09:28:35 | title | ActiveX Object Vulnerability | version | 76 |
|
refmap
via4
|
bid | 25289 | bugtraq | 20070815 TlbInf32 ActiveX Command Execution | cert | TA07-226A | osvdb | 36396 | sectrack | 1018562 | secunia | 26419 | vupen | ADV-2007-2869 |
|
saint
via4
|
bid | 25289 | description | Internet Explorer tblinf32.dll ActiveX IObjectsafety vulnerability | id | win_patch_ie_v5,win_patch_ie_v6,win_patch_ie_v7 | osvdb | 36396 | title | ie_tblinf32_iobjectsafety | type | client |
|
Last major update |
23-07-2021 - 15:04 |
Published |
14-08-2007 - 21:17 |
Last modified |
23-07-2021 - 15:04 |