CVE-2005-2127 (CNNVD-200508-200)
中文标题:
Microsoft Visual Studio .NET 远程代码执行漏洞
英文标题:
Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (a...
漏洞描述
中文描述:
Visual Studio .NET是用于创建和集成XML Web服务和应用程序的综合开发工具。 Microsoft Visual Studio .NET中的漏洞可能允许攻击者远程执行任意代码。目前更多信息不详。
英文描述:
Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| ati | catalyst_driver | * | - | - |
cpe:2.3:a:ati:catalyst_driver:*:*:*:*:*:*:*:*
|
| microsoft | .net_framework | 1.1 | - | - |
cpe:2.3:a:microsoft:.net_framework:1.1:*:*:*:*:*:*:*
|
| microsoft | office | * | - | - |
cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*
|
| microsoft | office | 2000 | - | - |
cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*
|
| microsoft | office | xp | - | - |
cpe:2.3:a:microsoft:office:xp:sp1:*:*:*:*:*:*
|
| microsoft | project | 98 | - | - |
cpe:2.3:a:microsoft:project:98:*:*:*:*:*:*:*
|
| microsoft | project | 2000 | - | - |
cpe:2.3:a:microsoft:project:2000:*:*:*:*:*:*:*
|
| microsoft | project | 2002 | - | - |
cpe:2.3:a:microsoft:project:2002:*:*:*:*:*:*:*
|
| microsoft | project | 2003 | - | - |
cpe:2.3:a:microsoft:project:2003:*:*:*:*:*:*:*
|
| microsoft | visio | 2000 | - | - |
cpe:2.3:a:microsoft:visio:2000:sr1:*:*:enterprise:*:*:*
|
| microsoft | visio | 2002 | - | - |
cpe:2.3:a:microsoft:visio:2002:*:*:*:*:*:*:*
|
| microsoft | visio | 2003 | - | - |
cpe:2.3:a:microsoft:visio:2003:*:*:*:*:*:*:*
|
| microsoft | visual_studio_.net | 2002 | - | - |
cpe:2.3:a:microsoft:visual_studio_.net:2002:gold:*:*:*:*:*:*
|
| microsoft | visual_studio_.net | 2003 | - | - |
cpe:2.3:a:microsoft:visual_studio_.net:2003:*:*:*:enterprise_architect:*:*:*
|
| microsoft | visual_studio_.net | gold | - | - |
cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:academic:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
CVSS评分详情
AV:N/AC:L/Au:N/C:P/I:P/A:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2005-2127 |
2025-11-11 15:17:34 | 2025-11-11 07:32:27 |
| NVD | nvd_CVE-2005-2127 |
2025-11-11 14:51:19 | 2025-11-11 07:41:13 |
| CNNVD | cnnvd_CNNVD-200508-200 |
2025-11-11 15:08:48 | 2025-11-11 07:49:00 |
| EXPLOITDB | exploitdb_EDB-26167 |
2025-11-11 15:05:57 | 2025-11-11 08:22:49 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 28 -> 31
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-200508-200
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.5
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 15
- data_sources: ['cve'] -> ['cve', 'nvd']