int(1674)

Vulnerability Bulletins


Ejecución remota de código en Microsoft Internet Explorer

Vulnerability classification

Property Value
Confidence level Oficial
Impact Obtener acceso
Dificulty Principiante
Required attacker level Acceso remoto sin cuenta a un servicio estandar

System information

Property Value
Affected manufacturer Microsoft
Affected software JView Profiler
Internet Explorer 5.01 Service Pack 4 / Microsoft Windows 2000 Service Pack 4
Internet Explorer 6 Service Pack 1 / Microsoft Windows 2000 Service Pack 4
Internet Explorer 6 Service Pack 1 / Microsoft Windows XP Service Pack 1
Internet Explorer 6 / Microsoft Windows XP Service Pack 2
Internet Explorer 6 / Microsoft Windows Server 2003
Internet Explorer 6 / Microsoft Windows Server 2003 Service Pack 1
Microsoft Windows Server 2003 Itanium-based Systems
Microsoft Windows Server 2003 SP1 Itanium-based Systems
Internet Explorer 6 for Microsoft Windows Server 2003 x64 Edition
Internet Explorer 6 / Microsoft Windows XP Professional x64 Edition
Internet Explorer 5.5 Service Pack 2 / Microsoft Windows Millennium Edition
Internet Explorer 6 Service Pack 1 / Microsoft Windows 98
Internet Explorer 6 Service Pack 1 / Microsoft Windows 98 SE
Internet Explorer 6 Service Pack 1 / Microsoft Windows Millennium Edition

Description

Se ha descubierto una vulnerabilidad de desbordamiento de búfer en Microsoft Internet Explorer. La vulnerabilidad reside en el objeto COM "javaprxy.dll" que forma parte de la máquina virtual de Java de Microsoft.

La explotación de esta vulnerabilidad podría permitir a un atacante remoto ejecutar código arbitrario mediante una página Web especialmente diseñada que la víctima debe visualizar.

Solution



Actualización de software

Microsoft
Internet Explorer 5.01 Service Pack 4 / Microsoft Windows 2000 Service Pack 4
http://www.microsoft.com/downloads/details.aspx?FamilyId=25982E02-EC6D-44CE-82DE-12DDEF1ADDD6
Internet Explorer 6 Service Pack 1 / Microsoft Windows 2000 Service Pack 4
Internet Explorer 6 Service Pack 1 / Microsoft Windows XP Service Pack 1
http://www.microsoft.com/downloads/details.aspx?FamilyId=2A506C16-01EF-4060-BCF8-6993C55840A9
Internet Explorer 6 / Microsoft Windows XP Service Pack 2
http://www.microsoft.com/downloads/details.aspx?FamilyId=C1381768-6C6D-4568-97B1-600DB8798EBF
Internet Explorer 6 / Microsoft Windows Server 2003
Internet Explorer 6 / Microsoft Windows Server 2003 Service Pack 1
http://www.microsoft.com/downloads/details.aspx?FamilyId=F368E231-9918-4881-9F17-60312F82183F
Microsoft Windows Server 2003 Itanium-based Systems
Microsoft Windows Server 2003 SP1 Itanium-based Systems
http://www.microsoft.com/downloads/details.aspx?FamilyId=D785F9AB-DBE9-4272-A87E-64205690F98E
Internet Explorer 6 for Microsoft Windows Server 2003 x64 Edition
http://www.microsoft.com/downloads/details.aspx?FamilyId=68209225-A682-4008-A22B-881C401486F7
Internet Explorer 6 / Microsoft Windows XP Professional x64 Edition
http://www.microsoft.com/downloads/details.aspx?FamilyId=80EFD9A8-7EE9-4B0B-8517-559C49614AB7

Standar resources

Property Value
CVE CAN-2005-2087
BID 14087

Other resources

SEC-CONSULT Security Advisory 20050629-0
http://www.sec-consult.com/184.html

Microsoft Security Advisory 903144
http://www.microsoft.com/technet/security/advisory/903144.mspx

Microsoft Security Bulletin MS05-037
http://www.microsoft.com/technet/security/Bulletin/MS05-037.mspx

Version history

Version Comments Date
1.0 Aviso emitido 2005-07-06
1.1 Aviso emitido por Microsoft (MS05-037) 2005-07-13
Ministerio de Defensa
CNI
CCN
CCN-CERT