MS.ATL.Object.Type.Mismatch.Code.Execution
Description
This indicates an attack attempt against a memory corruption vulnerability in Microsoft Active Template Library (ATL).
The vulnerability is caused by an error when the ATL headers handles a malicious variant read from a stream. It allows a remote attacker to execute arbitrary code via sending a crafted web page.
Affected Products
Microsoft Windows 2000 Service Pack 4
Windows XP Media Center Edition 2005
Windows XP Service Pack 2 and Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2
Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply patch, available from the web site:
http://www.microsoft.com/technet/security/Bulletin/ms09-037.mspx
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |