Vulnerability Details : CVE-2005-2127
Potential exploit
Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."
Vulnerability category: Memory CorruptionExecute codeDenial of service
Products affected by CVE-2005-2127
- cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office:2000:*:*:zh:*:*:*:*
- cpe:2.3:a:microsoft:office:2000:*:*:ja:*:*:*:*
- cpe:2.3:a:microsoft:office:2000:*:*:ko:*:*:*:*
- cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office:2000:sp2:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office:xp:sp1:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office:xp:sp2:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office:2000:sp1:*:*:*:*:*:*
- cpe:2.3:a:microsoft:project:98:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:project:2000:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:project:2002:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:project:2002:sp1:*:*:*:*:*:*
- cpe:2.3:a:microsoft:project:2003:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:project:2003:sp1:*:*:*:*:*:*
- cpe:2.3:a:microsoft:.net_framework:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:.net_framework:1.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:microsoft:.net_framework:1.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:microsoft:.net_framework:1.1:sp3:*:*:*:*:*:*
- cpe:2.3:a:microsoft:visio:2002:sp2:*:*:*:*:*:*
- cpe:2.3:a:microsoft:visio:2003:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:visio:2002:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:visio:2002:sp1:*:*:*:*:*:*
- cpe:2.3:a:microsoft:visio:2002:*:*:*:professional:*:*:*
- cpe:2.3:a:microsoft:visio:2003:sp1:*:*:*:*:*:*
- cpe:2.3:a:microsoft:visio:2002:sp2:*:*:standard:*:*:*
- cpe:2.3:a:microsoft:visio:2000:sr1:*:*:enterprise:*:*:*
- cpe:2.3:a:microsoft:visio:2003:*:*:*:professional:*:*:*
- cpe:2.3:a:microsoft:visio:2003:*:*:*:standard:*:*:*
- cpe:2.3:a:microsoft:visio:2002:sp2:*:*:professional:*:*:*
- cpe:2.3:a:microsoft:visual_studio_.net:2002:gold:*:*:*:*:*:*
- cpe:2.3:a:microsoft:visual_studio_.net:2003:gold:*:*:*:*:*:*
- cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:trial:*:*:*
- cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:academic:*:*:*
- cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:enterprise_architect:*:*:*
- cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:enterprise_developer:*:*:*
- cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:professional:*:*:*
- cpe:2.3:a:microsoft:visual_studio_.net:2003:*:*:*:enterprise_architect:*:*:*
- cpe:2.3:a:ati:catalyst_driver:*:*:*:*:*:*:*:*
Threat overview for CVE-2005-2127
Top countries where our scanners detected CVE-2005-2127
Top open port discovered on systems with this issue
8081
IPs affected by CVE-2005-2127 8
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2005-2127!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2005-2127
42.71%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-2127
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2005-2127
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2005-2127
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1464
-
http://www.securityfocus.com/bid/14594
Exploit;Patch;Third Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/15061
Third Party Advisory;VDB Entry
-
http://www.kb.cert.org/vuls/id/959049
Third Party Advisory;US Government Resource
-
http://www.kb.cert.org/vuls/id/898241
Third Party Advisory;US Government Resource
-
http://www.microsoft.com/technet/security/advisory/906267.mspx
Mitigation;Patch;Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1155
-
http://securityreason.com/securityalert/72
Third Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1468
-
http://www.vupen.com/english/advisories/2005/1450
Broken Link
-
http://isc.sans.org/diary.php?date=2005-08-18
Third Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/34754
VDB Entry
-
http://www.us-cert.gov/cas/techalerts/TA06-220A.html
Third Party Advisory;US Government Resource
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/21895
VDB Entry
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1454
-
http://secunia.com/advisories/17172
Permissions Required;Third Party Advisory
-
http://www.us-cert.gov/cas/techalerts/TA05-284A.html
Third Party Advisory;US Government Resource
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1538
-
http://securitytracker.com/id?1014727
Exploit;Patch;Third Party Advisory;VDB Entry;Vendor Advisory
-
http://secunia.com/advisories/16480
Patch;Vendor Advisory
-
http://www.securityfocus.com/archive/1/470690/100/0/threaded
-
http://www.us-cert.gov/cas/techalerts/TA05-347A.html
Third Party Advisory;US Government Resource
-
http://www.kb.cert.org/vuls/id/740372
Third Party Advisory;US Government Resource
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1535
-
http://secunia.com/advisories/17509
Permissions Required;Third Party Advisory
-
http://secunia.com/advisories/17223
Permissions Required;Third Party Advisory
-
http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf
Third Party Advisory
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-052
Jump to