{"vuid":"VU#597889","idnumber":"597889","name":"Microsoft COM Structured Storage Vulnerability","keywords":["MS05-012","COM","OLE"],"overview":"A vulnerability in a way that various programs handle COM objects could allow a local attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Microsoft's COM is a data representation that allows multiple kinds of objects to be stored in one document. COM structured storage defines how to treat a single file entity as a structured collection of two types of objects, storages and streams, that behave like directories and files respectively. An error in the way that the affected operating systems and programs access memory when they process COM structured storage files or objects results in a vulnerability that could allow local attackers to gain elevated privileges. Additional details about the underlying cause of the vulnerability are not known. An authenticated local attacker with the ability to run a specially-crafted application could exploit this vulnerability to gain elevated privileges on the affected system.","impact":"An authenticated local attacker could execute arbitrary code on a vulnerable system to gain elevated privileges. The attacker-supplied code would be executed with the privileges of the component that exposes the vulnerability.","resolution":"Apply a patch Microsoft has published Microsoft Security Bulletin MS05-012 in response to this issue. Users are strongly encouraged to review this bulletin and apply the patches it refers to.","workarounds":"","sysaffected":"","thanks":"Thanks to Microsoft Security for reporting this vulnerability. Microsoft, in turn, thanks \nCesar Cerrudo of \nApplication Security Inc. for reporting this issue to them.","author":"This document was written by Chad R Dougherty based upon information provided by Microsoft.","public":["h","t","t","p",":","/","/","w","w","w",".","m","i","c","r","o","s","o","f","t",".","c","o","m","/","t","e","c","h","n","e","t","/","s","e","c","u","r","i","t","y","/","b","u","l","l","e","t","i","n","/","m","s","0","5","-","0","1","2",".","m","s","p","x"],"cveids":["CVE-2005-0047"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-02-08T19:06:35Z","publicdate":"2005-02-08T00:00:00Z","datefirstpublished":"2005-02-08T23:39:36Z","dateupdated":"2005-02-08T23:39:45Z","revision":2,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"15","cam_impact":"19","cam_easeofexploitation":"8","cam_attackeraccessrequired":"10","cam_scorecurrent":"10.6875","cam_scorecurrentwidelyknown":"12.825","cam_scorecurrentwidelyknownexploited":"21.375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":10.6875,"vulnote":null}