Short Name |
HTTP:STC:IE:WIN-ADO-EXEC |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft Windows Data Access Components ADO Record Code Execution |
Release Date |
2011/01/18 |
Update Number |
1850 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in Microsoft Windows Data Access Components (MDAC). It is due to the way that Microsoft Data Access Components allocates memory when handling the ActiveX Data Objects (ADO) Record data structures. Remote attackers can exploit this by enticing target users to visit a maliciously crafted Web page. A successful attack can result in arbitrary code execution with the privileges of the logged in user.
Microsoft Data Access Components are prone to a remote memory-corruption vulnerability. An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage. Successful exploits will allow the attacker to execute arbitrary code within the context of the application. Failed exploit attempts will result in a denial-of-service condition. NOTE: This issue was originally reported at the 2010 CanSecWest conference as part of the Pwn2Own contest. It was also previously documented in BID 38951 (Microsoft Internet Explorer Unspecified Remote Code Execution Vulnerabilities) but has been moved here to better document it.