Overview
A vulnerability in the way Microsoft Internet Explorer instantiates COM objects may lead to execution of arbitrary code.
Description
Component Object Model, or COM objects, are used to enable interprocess communication and dynamic object creation within Microsoft Windows. Microsoft Internet Explorer contains a vulnerability that could be exploited when it attempts to load specially crafted web sites that instantiate specific COM objects contained in Msb1fren.dll, Htmlmm.ocx, or Blnmgrps.dll. According to Microsoft Security Bulletin MS07-016 When Internet Explorer tries to instantiate certain COM objects as ActiveX controls, the COM objects may corrupt the system state in such a way that an attacker could execute arbitrary code. |
Impact
A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial-of-service condition. |
Solution
Update |
Disable ActiveX
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported in Microsoft Security Bulletin MS07-016. Microsoft credits H D Moore of BreakingPoint Systems for reporting this issue.
This document was written by Chris Taschner.
Other Information
CVE IDs: | CVE-2007-0219 |
Severity Metric: | 25.65 |
Date Public: | 2007-02-13 |
Date First Published: | 2007-02-14 |
Date Last Updated: | 2007-03-13 19:23 UTC |
Document Revision: | 19 |