Microsoft Visual Basic Multiple Remote Code Execution Vulnerabilities (10 December 2008)
RISK: Medium Risk
1. DataGrid Control Memory Corruption Vulnerability
A remote code execution vulnerability exists in the DataGrid ActiveX Control for Visual Basic 6. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.
2. FlexGrid Control Memory Corruption Vulnerability
A remote code execution vulnerability exists in the FlexGrid ActiveX Control for Visual Basic 6. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.
3. Hierarchical FlexGrid Control Memory Corruption Vulnerability
A remote code execution vulnerability exists in the Hierarchical FlexGrid ActiveX Control for Visual Basic 6. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.
4. Windows Common AVI Parsing Overflow Vulnerability
A remote code execution vulnerability exists in the Windows Common ActiveX Control for Visual Basic 6. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.
5. Charts Control Memory Corruption Vulnerability
A remote code execution vulnerability exists in the Charts ActiveX Control for Visual Basic 6. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.
6. Masked Edit Control Memory Corruption Vulnerability
A remote code execution vulnerability exists in the Masked Edit ActiveX Control for Visual Basic 6. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.
Impact
- Remote Code Execution
System / Technologies affected
- Microsoft Visual Basic 6.0 Runtime Extended Files
- Microsoft Visual Studio .NET 2002 Service Pack 1
- Microsoft Visual Studio .NET 2003 Service Pack 1
- Microsoft Visual FoxPro 8.0 Service Pack 1
- Microsoft Visual FoxPro 9.0 Service Pack 1
- Microsoft Visual FoxPro 9.0 Service Pack 2
- Microsoft Office FrontPage 2002 Service Pack 3
- Microsoft Office Project 2003 Service Pack 3
- Microsoft Office Project 2007
- Microsoft Office Project 2007 Service Pack 1
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
Download locations for this patch
- Microsoft Visual Basic 6.0 Runtime Extended Files
- Microsoft Visual Studio .NET 2002 Service Pack 1
- Microsoft Visual Studio .NET 2003 Service Pack 1
- Microsoft Visual FoxPro 8.0 Service Pack 1
- Microsoft Visual FoxPro 9.0 Service Pack 1
- Microsoft Visual FoxPro 9.0 Service Pack 2
- Microsoft Office FrontPage 2002 Service Pack 3
- Microsoft Office Project 2003 Service Pack 3
- Microsoft Office Project 2007
- Microsoft Office Project 2007 Service Pack 1
Vulnerability Identifier
Source
Related Link
Share with