Vulnerabilities > CVE-2007-2216 - Configuration vulnerability in Microsoft Internet Explorer 5.01/6/7
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The tblinf32.dll (aka vstlbinf.dll) ActiveX control for Internet Explorer 5.01, 6 SP1, and 7 uses an incorrect IObjectsafety implementation, which allows remote attackers to execute arbitrary code by requesting the HelpString property, involving a crafted DLL file argument to the TypeLibInfoFromFile function, which overwrites the HelpStringDll property to call the DLLGetDocumentation function in another DLL file, aka "ActiveX Object Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 |
Common Weakness Enumeration (CWE)
Exploit-Db
description | Microsoft Internet Explorer 5.0.1 TBLinf32.DLL ActiveX Control Remote Code Execution Vulnerability. CVE-2007-2216. Remote exploit for windows platform |
id | EDB-ID:30490 |
last seen | 2016-02-03 |
modified | 2007-05-08 |
published | 2007-05-08 |
reporter | Brett Moore |
source | https://www.exploit-db.com/download/30490/ |
title | Microsoft Internet Explorer 5.0.1 TBLinf32.DLL ActiveX Control Remote Code Execution Vulnerability |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS07-045.NASL |
description | The remote host is missing IE Cumulative Security Update 937143. The remote version of IE is potentially vulnerable to several flaws that may allow an attacker to execute arbitrary code on the remote host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25883 |
published | 2007-08-14 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25883 |
title | MS07-045: Cumulative Security Update for Internet Explorer (937143) |
code |
|
Oval
accepted | 2014-02-24T04:00:47.730-05:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
description | The tblinf32.dll (aka vstlbinf.dll) ActiveX control for Internet Explorer 5.01, 6 SP1, and 7 uses an incorrect IObjectsafety implementation, which allows remote attackers to execute arbitrary code by requesting the HelpString property, involving a crafted DLL file argument to the TypeLibInfoFromFile function, which overwrites the HelpStringDll property to call the DLLGetDocumentation function in another DLL file, aka "ActiveX Object Vulnerability." | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:2109 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
submitted | 2007-08-15T09:28:35 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
title | ActiveX Object Vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
version | 73 |
Saint
bid | 25289 |
description | Internet Explorer tblinf32.dll ActiveX IObjectsafety vulnerability |
id | win_patch_ie_v5,win_patch_ie_v6,win_patch_ie_v7 |
osvdb | 36396 |
title | ie_tblinf32_iobjectsafety |
type | client |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 25289 CVE(CAN) ID: CVE-2007-2216 Internet Explorer是微软发布的非常流行的WEB浏览器。 IE的tblinf32.dll ActiveX控件实现上存在漏洞,远程攻击者可能利用此漏洞控制用户系统。 IE中tblinf32.dll或vstlbinf.dll ActiveX控件没有正确地实现IObjectsafety,如果用户受骗访问了恶意站点的话就可能导致执行任意指令。成功利用此漏洞的攻击者可以获得与本地用户相同的用户权限,那些帐户被配置为拥有较少系统用户权限的用户比具有管理用户权限的用户受到的影响要小。 Microsoft Internet Explorer 7.0 Microsoft Internet Explorer 6.0 SP1 Microsoft Internet Explorer 6.0 Microsoft Internet Explorer 5.01 临时解决方法: * 将Internet Explorer配置为在Internet和本地Intranet安全区域中运行ActiveX控件之前进行提示 * 将Internet 和本地Intranet安全区域设置设为“高”,以便在这些区域中运行ActiveX控件和活动脚本之前进行提示 * 禁止在Internet Explorer中运行COM对象 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS07-045)以及相应补丁: MS07-045:Cumulative Security Update for Internet Explorer (937143) 链接:<a href="http://www.microsoft.com/technet/security/Bulletin/MS07-045.mspx?pf=true" target="_blank">http://www.microsoft.com/technet/security/Bulletin/MS07-045.mspx?pf=true</a> |
id | SSV:2118 |
last seen | 2017-11-19 |
modified | 2007-08-17 |
published | 2007-08-17 |
reporter | Root |
title | Microsoft IE tblinf32.dll ActiveX控件远程代码执行漏洞(MS07-045) |
References
- http://www.us-cert.gov/cas/techalerts/TA07-226A.html
- http://www.securityfocus.com/bid/25289
- http://www.osvdb.org/36396
- http://securitytracker.com/id?1018562
- http://secunia.com/advisories/26419
- http://www.vupen.com/english/advisories/2007/2869
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2109
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045
- http://www.securityfocus.com/archive/1/476742/100/0/threaded