Vulnerability Note VU#597889
Microsoft COM Structured Storage Vulnerability
A vulnerability in a way that various programs handle COM objects could allow a local attacker to execute arbitrary code on a vulnerable system.
Microsoft's COM is a data representation that allows multiple kinds of objects to be stored in one document. COM structured storage defines how to treat a single file entity as a structured collection of two types of objects, storages and streams, that behave like directories and files respectively. An error in the way that the affected operating systems and programs access memory when they process COM structured storage files or objects results in a vulnerability that could allow local attackers to gain elevated privileges. Additional details about the underlying cause of the vulnerability are not known. An authenticated local attacker with the ability to run a specially-crafted application could exploit this vulnerability to gain elevated privileges on the affected system.
An authenticated local attacker could execute arbitrary code on a vulnerable system to gain elevated privileges. The attacker-supplied code would be executed with the privileges of the component that exposes the vulnerability.
Apply a patch
Microsoft has published Microsoft Security Bulletin MS05-012 in response to this issue. Users are strongly encouraged to review this bulletin and apply the patches it refers to.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||08 Feb 2005|
CVSS Metrics (Learn More)
Thanks to Microsoft Security for reporting this vulnerability. Microsoft, in turn, thanks Cesar Cerrudo of Application Security Inc. for reporting this issue to them.
This document was written by Chad R Dougherty based upon information provided by Microsoft.
- CVE IDs: CAN-2005-0047
- Date Public: 08 Feb 2005
- Date First Published: 08 Feb 2005
- Date Last Updated: 08 Feb 2005
- Severity Metric: 10.69
- Document Revision: 2
If you have feedback, comments, or additional information about this vulnerability, please send us email.