{"vuid":"VU#740372","idnumber":"740372","name":"Microsoft DDS Library Shape Control (msdds.dll) COM object contains an unspecified vulnerability","keywords":["Microsoft DDS Library Shape Control","msdds.dll","COM object"],"overview":"Microsoft DDS Library Shape Control COM object contains an unspecified vulnerability, which may allow a remote attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Microsoft COM Microsoft COM is a technology that allows programmers to create reusable software components that can be incorporated into applications to extend their functionality. Microsoft COM includes COM+, Distributed COM (DCOM), and ActiveX Controls. ActiveX controls ActiveX controls are COM objects that are designed to be used in Internet Explorer. A web page can make use of an ActiveX control through the use of the OBJECT tag. Microsoft DDS Library Shape Control The Microsoft DDS Library Shape Control is a COM object provided by msdds.dll, which comes with various Microsoft products such as Visual Studio .NET and Microsoft Office. The Problem Internet Explorer will attempt to instantiate any COM object that is referenced by a web page. COM objects that are not ActiveX controls may cause unexpected results, such as crashing Internet Explorer. We are tracking this issue as VU#680526. The Microsoft DDS Library Shape Control COM object crashes in a way that can be exploited to execute arbitrary code on a vulnerable system. Through limited local testing, it appears that systems with Visual Studio .NET 2002 are vulnerable to the public exploit code. msdds.dll versions 7.0.6064.9112 and 7.0.9466.0 are vulnerable, but version 7.10.3077.0 does not appear to be vulnerable. Although Office XP does provide a vulnerable version of msdds.dll, the default install does not provide the required msvcp70.dll and msvcr70.dll files for the COM object to be to be used by Internet Explorer.","impact":"By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message), an attacker may be able to execute arbitrary code with the privileges of the user. The attacker could also cause IE (or the program using the WebBrowser control) to crash. Proof of concept code is publicly available.","resolution":"Apply an update\nApply the appropriate update, as specified in Microsoft Security Bulletin MS05-052. This update sets the \"kill bit\" for certain CLSID values of COM objects known to be vulnerable, including the Microsoft DDS Library Shape Control.","workarounds":"Disable ActiveX Disabling ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this vulnerability. With ActiveX controls disabled, COM objects will not be instantiated. Instructions for disabling Active scripting and ActiveX in the Internet Zone can be found in the Malicious Web Scripts FAQ. Note that disabling ActiveX controls in the Internet Zone will reduce the functionality of some web sites.","sysaffected":"","thanks":"This vulnerability was publicly disclosed by FrSIRT.","author":"This document was written by Will Dormann.","public":["http://www.microsoft.com/technet/security/Bulletin/MS05-052.mspx","http://www.microsoft.com/technet/security/advisory/906267.mspx","http://www.kb.cert.org/vuls/id/680526","http://www.kb.cert.org/vuls/id/959049","http://secunia.com/advisories/16480/","http://www.securityfocus.com/bid/14594","http://www.securitytracker.com/alerts/2005/Aug/1014727.html","http://xforce.iss.net/xforce/xfdb/21895"],"cveids":["CVE-2005-2127"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-08-18T13:46:53Z","publicdate":"2005-08-17T00:00:00Z","datefirstpublished":"2005-08-18T22:25:32Z","dateupdated":"2005-10-13T14:10:19Z","revision":22,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"4","cam_impact":"15","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"10.125","cam_scorecurrentwidelyknown":"10.125","cam_scorecurrentwidelyknownexploited":"16.875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":10.125,"vulnote":null}