{"vuid":"VU#939605","idnumber":"939605","name":"JVIEW Profiler (javaprxy.dll) COM object contains an unspecified vulnerability","keywords":["Microsoft","Internet Explorer","CLSIDs","IE","javaprxy.dll","COM","ActiveX","heap corruption","arbitrary code execution","03D9F3F2-B0E3-11D2-B081-006008039BF0"],"overview":"The JVIEW Profiler COM object contains an unspecified vulnerability, which may allow a remote attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Microsoft COM Microsoft COM is a technology that allows programmers to create reusable software components that can be incorporated into applications to extend their functionality. Microsoft COM includes COM+, Distributed COM (DCOM), and ActiveX Controls. ActiveX controls ActiveX controls are COM objects that are designed to be used in Internet Explorer. A web page can make use of an ActiveX control through the use of the OBJECT tag. JVIEW Profiler The JVIEW Profiler is a COM object provided by javaprxy.dll, which is an interface to the debugger in the Microsoft Java Virtual Machine. The Problem Internet Explorer will attempt to instantiate any COM object that is referenced by a web page. COM objects that are not ActiveX controls may cause unexpected results, such as crashing Internet Explorer. The JVIEW Profiler COM object crashes in a way that can be exploited to execute arbitrary code on a vulnerable system.","impact":"By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message), an attacker could execute arbitrary code with the privileges of the user. The attacker could also cause IE (or the program using the WebBrowser control) to crash. Proof of concept code is publicly available.","resolution":"Apply An Update\nApply the appropriate update, as specified in the Microsoft Security Bulletin. This update sets the \"kill bit\" for the JVIEW Profiler COM object.","workarounds":"Microsoft has listed several workarounds in the Microsoft Security Bulletin, including disabling ActiveX controls, disabling Active scripting, and unregistering javaprxy.dll.","sysaffected":"","thanks":"This vulnerability was publicly reported by Bernhard Mueller.","author":"This document was written by Will Dormann.","public":["http://www.microsoft.com/technet/security/bulletin/ms05-037.mspx","http://www.microsoft.com/technet/security/advisory/903144.mspx","http://www.sec-consult.com/184.html","http://secunia.com/advisories/15891/","http://www.securitytracker.com/alerts/2005/Jun/1014329.html","http://www.osvdb.org/displayvuln.php?osvdb_id=17680","http://www.securityfocus.com/bid/14087","http://xforce.iss.net/xforce/xfdb/21193","http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33120"],"cveids":["CVE-2005-2087"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-06-29T17:33:29Z","publicdate":"2005-06-29T00:00:00Z","datefirstpublished":"2005-07-02T18:06:38Z","dateupdated":"2005-07-12T17:24:51Z","revision":28,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"14","cam_internetinfrastructure":"10","cam_population":"12","cam_impact":"15","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"44.55","cam_scorecurrentwidelyknown":"44.55","cam_scorecurrentwidelyknownexploited":"50.625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":44.55,"vulnote":null}