Vulnerability Note VU#753924
Microsoft Internet Explorer fails to properly instantiate COM objects
A vulnerability in the way Microsoft Internet Explorer instantiates COM objects may lead to execution of arbitrary code.
Component Object Model, or COM objects are used to enable interprocess communication and dynamic object creation within Microsoft Windows. Microsoft Internet Explorer contains a vulnerability that could be exploited when it attempts to load specially crafted websites that instantiate specific COM objects contained in Imjpcksid.dll, and Imjpskdic.dll. According to Microsoft Security Bulletin MS07-016:
When Internet Explorer tries to instantiate certain COM objects as ActiveX controls, the COM objects may corrupt the system state in such a way that an attacker could execute arbitrary code.
Note that this vulnerability does not affect Windows Internet Explorer 7 in Windows Vista.
A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial-of-service condition.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||13 Feb 2007||13 Feb 2007|
CVSS Metrics (Learn More)
This vulnerability was reported in Microsoft Security Bulletin MS07-016.
This document was written by Chris Taschner.
- CVE IDs: CVE-2006-4697
- Date Public: 13 Feb 2007
- Date First Published: 13 Feb 2007
- Date Last Updated: 23 Feb 2007
- Severity Metric: 25.65
- Document Revision: 11
If you have feedback, comments, or additional information about this vulnerability, please send us email.