Microsoft Visual Studio ATL Remote Code Execution Vulnerability (969706)

Summary
This host is missing a critical security update according to Microsoft Bulletin MS09-035.
Impact
Successful exploitation will let the attacker execute arbitrary code which may result in memory corruption on the affected system. Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link. http://www.microsoft.com/technet/security/bulletin/ms09-035.mspx
Insight
- An error in the ATL headers when handling persisted streams can be exploited to cause VariantClear function to be called on a VARIANT that has not been correctly initialised via a specially crafted web page. - An error in the ATL headers when handling object instantiation from data streams may allow bypassing of security policies such as kill-bits in Internet Explorer if a control or component uses OleLoadFromStream function in an unsafe manner. - An error in ATL may result in a string being read without terminating NULL bytes, which can be exploited to disclose memory contents beyond the end of the string.
Affected
Microsoft Visual Studio 2005 SP 1 and prior Microsoft Visual Studio 2008 SP 1 and prior Microsoft Visual Studio .NET 2003 SP 1 and prior
References