Summary
This host is missing a critical security update according to Microsoft Bulletin MS09-035.
Impact
Successful exploitation will let the attacker execute arbitrary code which may result in memory corruption on the affected system.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link.
http://www.microsoft.com/technet/security/bulletin/ms09-035.mspx
Insight
- An error in the ATL headers when handling persisted streams can be exploited to cause VariantClear function to be called on a VARIANT that has not been correctly initialised via a specially crafted web page.
- An error in the ATL headers when handling object instantiation from data streams may allow bypassing of security policies such as kill-bits in Internet Explorer if a control or component uses OleLoadFromStream function in an unsafe manner.
- An error in ATL may result in a string being read without terminating NULL bytes, which can be exploited to disclose memory contents beyond the end of the string.
Affected
Microsoft Visual Studio 2005 SP 1 and prior
Microsoft Visual Studio 2008 SP 1 and prior
Microsoft Visual Studio .NET 2003 SP 1 and prior
References
Severity
Classification
-
CVE CVE-2009-0901, CVE-2009-2493, CVE-2009-2495 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Comctl32 Integer Overflow Vulnerability (2864058)
- Embedded OpenType Font Engine Remote Code Execution Vulnerability (982132)
- Microsoft .NET Framework Remote Code Execution Vulnerability (2484015)
- Microsoft .NET Framework Remote Code Execution Vulnerabilities (2878890)
- Microsoft IIS Authentication Remote Code Execution Vulnerability (982666)