CVE-2005-2127 (CNNVD-200508-200)

HIGH 有利用代码
中文标题:
Microsoft Visual Studio .NET 远程代码执行漏洞
英文标题:
Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (a...
CVSS分数: 7.5
发布时间: 2005-08-19 04:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v4
漏洞描述
中文描述:

Visual Studio .NET是用于创建和集成XML Web服务和应用程序的综合开发工具。 Microsoft Visual Studio .NET中的漏洞可能允许攻击者远程执行任意代码。目前更多信息不详。

英文描述:

Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."

CWE类型:
CWE-119
标签:
remote windows anonymous OSVDB-19093
受影响产品
厂商 产品 版本 版本范围 平台 CPE
ati catalyst_driver * - - cpe:2.3:a:ati:catalyst_driver:*:*:*:*:*:*:*:*
microsoft .net_framework 1.1 - - cpe:2.3:a:microsoft:.net_framework:1.1:*:*:*:*:*:*:*
microsoft office * - - cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*
microsoft office 2000 - - cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*
microsoft office xp - - cpe:2.3:a:microsoft:office:xp:sp1:*:*:*:*:*:*
microsoft project 98 - - cpe:2.3:a:microsoft:project:98:*:*:*:*:*:*:*
microsoft project 2000 - - cpe:2.3:a:microsoft:project:2000:*:*:*:*:*:*:*
microsoft project 2002 - - cpe:2.3:a:microsoft:project:2002:*:*:*:*:*:*:*
microsoft project 2003 - - cpe:2.3:a:microsoft:project:2003:*:*:*:*:*:*:*
microsoft visio 2000 - - cpe:2.3:a:microsoft:visio:2000:sr1:*:*:enterprise:*:*:*
microsoft visio 2002 - - cpe:2.3:a:microsoft:visio:2002:*:*:*:*:*:*:*
microsoft visio 2003 - - cpe:2.3:a:microsoft:visio:2003:*:*:*:*:*:*:*
microsoft visual_studio_.net 2002 - - cpe:2.3:a:microsoft:visual_studio_.net:2002:gold:*:*:*:*:*:*
microsoft visual_studio_.net 2003 - - cpe:2.3:a:microsoft:visual_studio_.net:2003:*:*:*:enterprise_architect:*:*:*
microsoft visual_studio_.net gold - - cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:academic:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
VU#959049 third-party-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
20070606 IE 6/Microsoft Html Popup Window (mshtml.dll) DoS mailing-list
cve.org
访问
72 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
TA05-347A third-party-advisory
cve.org
访问
MS05-052 vendor-advisory
cve.org
访问
15061 vdb-entry
cve.org
访问
17223 third-party-advisory
cve.org
访问
oval:org.mitre.oval:def:1454 vdb-entry
cve.org
访问
16480 third-party-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
microsoft-ie-mshtml-dos(34754) vdb-entry
cve.org
访问
17172 third-party-advisory
cve.org
访问
oval:org.mitre.oval:def:1538 vdb-entry
cve.org
访问
Win-msdss-command-execution(21895) vdb-entry
cve.org
访问
oval:org.mitre.oval:def:1535 vdb-entry
cve.org
访问
14594 vdb-entry
cve.org
访问
oval:org.mitre.oval:def:1468 vdb-entry
cve.org
访问
17509 third-party-advisory
cve.org
访问
TA06-220A third-party-advisory
cve.org
访问
oval:org.mitre.oval:def:1464 vdb-entry
cve.org
访问
VU#740372 third-party-advisory
cve.org
访问
VU#898241 third-party-advisory
cve.org
访问
1014727 vdb-entry
cve.org
访问
TA05-284A third-party-advisory
cve.org
访问
ADV-2005-1450 vdb-entry
cve.org
访问
oval:org.mitre.oval:def:1155 vdb-entry
cve.org
访问
ExploitDB EDB-26167 EXPLOIT
exploitdb
访问
Download Exploit EDB-26167 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2005-2127 ADVISORY
cve.org
访问
CVSS评分详情
7.5
HIGH
CVSS向量: AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS版本: 2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2005-08-19 04:00:00
修改时间:
2024-08-07 22:15:37
创建时间:
2025-11-11 15:32:27
更新时间:
2025-11-11 16:22:49
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2005-2127 2025-11-11 15:17:34 2025-11-11 07:32:27
NVD nvd_CVE-2005-2127 2025-11-11 14:51:19 2025-11-11 07:41:13
CNNVD cnnvd_CNNVD-200508-200 2025-11-11 15:08:48 2025-11-11 07:49:00
EXPLOITDB exploitdb_EDB-26167 2025-11-11 15:05:57 2025-11-11 08:22:49
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:22:49
references_count: 28 → 31; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 28 -> 31
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:49:00
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200508-200; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200508-200
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:13
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 15; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 15
  • data_sources: ['cve'] -> ['cve', 'nvd']