Products
Solutions
Customers
Partner
Resources
Company
Careers
Community

CVE Reference: CVE-2009-2493

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2009-2493

Description:
The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold and SP1, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2; does not properly restrict use of OleLoadFromStream in instantiating objects from data streams, which allows remote attackers to execute arbitrary code via a crafted HTML document with an ATL (1) component or (2) control, related to ATL headers and bypassing security policies, aka "ATL COM Initialization Vulnerability."

CVE Status:
Candidate

References:

SUSE
  http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html

SUNALERT
  http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020775.1-1
  http://sunsolve.sun.com/search/document.do?assetkey=1-66-264648-1
  http://sunsolve.sun.com/search/document.do?assetkey=1-66-266108-1

SAID
  Secunia Advisory: SA36187
  Secunia Advisory: SA36374
  Secunia Advisory: SA38568
  Secunia Advisory: SA36746

OVAL
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6421
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6304
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6245
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6473
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6621
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6716

MS
  http://www.microsoft.com/technet/security/Bulletin/MS09-060.mspx
  http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx
  http://www.microsoft.com/technet/security/Bulletin/MS09-055.mspx
  http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx
  http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

MISC
  http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx

HP
  http://marc.info/?l=bugtraq&m=126592505426855&w=2

CONFIRM
  http://www.novell.com/support/viewContent.do?externalId=7004997&sliceId=1
  http://www.openoffice.org/security/cves/CVE-2009-2493.html
  http://www.adobe.com/support/security/bulletins/apsb09-10.html
  http://www.adobe.com/support/security/bulletins/apsb09-13.html
  http://www.adobe.com/support/security/advisories/apsa09-04.html
  http://www.adobe.com/support/security/bulletins/apsb09-11.html

CERT
  http://www.us-cert.gov/cas/techalerts/TA09-286A.html
  http://www.us-cert.gov/cas/techalerts/TA09-342A.html
  http://www.us-cert.gov/cas/techalerts/TA09-195A.html
  http://www.us-cert.gov/cas/techalerts/TA09-223A.html


Return to the previous page.


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability