MS.Visual.Studio.WMI.Object.Broker.Remote.Code.Execution
Description
This indicates an attack attempt to exploit a Memory Corruption vulnerability
in Microsoft Visual Studio.
The vulnerability, which is located in the WMI Object Broker ActiveX control, can be exploited through misuse of the "CreateObject" function. It may allow remote attackers to execute arbitrary code in the context of the application using the affected ActiveX control. Failed exploit attempts will likely cause the program to crash, resulting in a Denial of Service condition.
Affected Products
Microsoft Visual Studio 2005 Team Edition for Testers
Microsoft Visual Studio 2005 Team Edition for Developers
Microsoft Visual Studio 2005 Team Edition for Architects
Microsoft Visual Studio 2005 Team Edition
Microsoft Visual Studio 2005 Standard Edition
Microsoft Visual Studio 2005 Professional Edition
Impact
System Comprise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Refer to the vendor's web site for the suggested workaround:
http://www.microsoft.com/technet/security/Bulletin/MS06-073.mspx
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |