ATL Uninitialized Object Vulnerability
Publish date: 30 de junio de 2011
Gravedad: Crítico
CVE Identifier: CVE-2009-0901,MS09-037,MS09-035,MS09-060
Fecha recomendada: 30 de junio de 2011
Descripción
The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2; does not prevent VariantClear calls on an uninitialized VARIANT, which allows remote attackers to execute arbitrary code via a malformed stream to an ATL (1) component or (2) control, related to ATL headers and error handling, aka "ATL Uninitialized Object Vulnerability."
Revelación de la información
Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.
Software y versión afectados
- microsoft visual_c++ 2005
- microsoft visual_c++ 2008
- microsoft visual_studio 2005
- microsoft visual_studio 2008
- microsoft visual_studio_.net 2003