ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [SA22452] Microsoft MDAC ADODB.Connection ActiveX Control Vulnerability



> 
> ----------------------------------------------------------------------
> 
> TITLE:
> Microsoft MDAC ADODB.Connection ActiveX Control Vulnerability
> 
> SECUNIA ADVISORY ID:
> SA22452
> 
> VERIFY ADVISORY:
> http://secunia.com/advisories/22452/
> 
> CRITICAL:
> Highly critical
> 
> IMPACT:
> DoS, System access
> 
> WHERE:
> From remote
> 
> OPERATING SYSTEM:
> Microsoft Windows XP Professional
> http://secunia.com/product/22/
> Microsoft Windows XP Home Edition
> http://secunia.com/product/16/
> Microsoft Windows Server 2003 Web Edition
> http://secunia.com/product/1176/
> Microsoft Windows Server 2003 Standard Edition
> http://secunia.com/product/1173/
> Microsoft Windows Server 2003 Enterprise Edition
> http://secunia.com/product/1174/
> Microsoft Windows Server 2003 Datacenter Edition
> http://secunia.com/product/1175/
> Microsoft Windows 2000 Server
> http://secunia.com/product/20/
> Microsoft Windows 2000 Professional
> http://secunia.com/product/1/
> Microsoft Windows 2000 Datacenter Server
> http://secunia.com/product/1177/
> Microsoft Windows 2000 Advanced Server
> http://secunia.com/product/21/
> 
> SOFTWARE:
> Microsoft Data Access Components (MDAC) 2.x
> http://secunia.com/product/1807/
> 
> DESCRIPTION:
> Yag Kohha has reported a vulnerability in Microsoft Data Access
> Components, which potentially can be exploited by malicious people to
> compromise a user's system.
> 
> The vulnerability is caused due to an error in the ADODB.Connection
> ActiveX control when handling the "Execute()" method. This can be
> exploited to cause a memory corruption by passing specially crafted
> parameters to the method.
> 
> Successful exploitation may allow execution of arbitrary code when a
> user e.g. visits a malicious website.
> 
> SOLUTION:
> Apply patches.
> 
> MDAC 2.5 SP3 on Windows 2000 SP4:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=EF163
> E3E-DD3B-4429-98A4-720DA2C96464
> 
> MDAC 2.8 SP1 on Windows XP SP2:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=6B0CD
> B65-AEF4-489F-B917-812D9F7687BD
> 
> MDAC 2.8 on Windows Server 2003:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=34D24
> 335-4EC0-49E7-9E3F-787F89DD7B1D
> 
> MDAC 2.8 on Windows Server 2003 for Itanium-based systems:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=58322
> D1B-A1A8-4BA6-BA1B-6649013CC324
> 
> MDAC 2.7 SP1 installed on Windows 2000 SP4:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=591B0
> 967-C8AB-4B85-A9AF-C01E8D8E3ADC
> 
> MDAC 2.8 installed on Windows 2000 SP4:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=BC864
> 245-175A-4B55-AB4A-FB5D0E03DCFC
> 
> MDAC 2.8 SP1 installed on Windows 2000 SP4:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=34185
> 9BF-8DAA-419B-88CD-E5E8EB4A5BAD
> 
> PROVIDED AND/OR DISCOVERED BY:
> Yag Kohha
> 
> The vendor also credits Frsirt.
> 
> ORIGINAL ADVISORY:
> MS07-009 (KB927779):
> http://www.microsoft.com/technet/security/Bulletin/MS07-009.mspx
> 
> OTHER REFERENCES:
> US-CERT VU#589272:
> http://www.kb.cert.org/vuls/id/589272
> 



 




Copyright © Lexa Software, 1996-2009.