CVE-2007-3091
https://notcve.org/view.php?id=CVE-2007-3091
Race condition in Microsoft Internet Explorer 6 SP1; 6 and 7 for Windows XP SP2 and SP3; 6 and 7 for Server 2003 SP2; 7 for Vista Gold, SP1, and SP2; and 7 for Server 2008 SP2 allows remote attackers to execute arbitrary code or perform other actions upon a page transition, with the permissions of the old page and the content of the new page, as demonstrated by setInterval functions that set location.href within a try/catch expression, aka the "bait & switch vulnerability" or "Race Condition Cross-Domain Information Disclosure Vulnerability." Una condición de carrera en Microsoft Internet Explorer versión 6 SP1; versiones 6 y 7 para Windows XP SP2 y SP3; versiones 6 y versión 7 para Server 2003 SP2; versión 7 para Vista Gold, SP1 y SP2; y versión 7 para Server 2008 SP2 permite a los atacantes remotos ejecutar código arbitrario o realizar otras acciones en una transición de página, con los permisos de la página antigua y el contenido de la página nueva, como es demostrado por las funciones setInterval que configuran el archivo location.href dentro de una expresión try/catch, también se conoce como "bait & switch vulnerability" o "Race Condition Cross-Domain Information Disclosure Vulnerability." • http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0026.html http://lcamtuf.coredump.cx/ierace http://osvdb.org/38497 http://osvdb.org/54944 http://secunia.com/advisories/25564 http://securityreason.com/securityalert/2781 http://securitytracker.com/id?1018192 http://www.kb.cert.org/vuls/id/471361 http://www.securityfocus.com/archive/1/470446/100/0/threaded http://www.securityfocus.com/bid/24283 http://www.us-cert.gov/cas/techalerts/TA09-160A.html http:/ • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2007-3092
https://notcve.org/view.php?id=CVE-2007-3092
Microsoft Internet Explorer 6 allows remote attackers to spoof the URL bar, and page properties including SSL certificates, by interrupting page loading through certain use of location DOM objects and setTimeout calls. NOTE: this issue can be leveraged for phishing and other attacks. Microsoft Internet Explorer 6 permite a atacantes remotos falsificar la barra de URL, y las propiedades de la página incluyendo certificados SSL, interrumpiendo la carga de la página mediante determinado uso de objetos de localización DOM y llamadas a setTimeout. NOTA: este problema puede ser aprovechado para ataques de fraude (phishing) y otros. • http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0026.html http://lcamtuf.coredump.cx/ietrap2 http://osvdb.org/45437 http://secunia.com/advisories/25564 http://securityreason.com/securityalert/2781 http://securitytracker.com/id?1018193 http://www.securityfocus.com/archive/1/470446/100/0/threaded http://www.securityfocus.com/bid/24298 https://exchange.xforce.ibmcloud.com/vulnerabilities/34705 •
CVE-2007-2938 – Microsoft Internet Explorer 6 / Ademco co. ltd. ATNBaseLoader100 Module - Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2007-2938
Buffer overflow in the BaseRunner ActiveX control in the Ademco ATNBaseLoader100 Module (ATNBaseLoader100.dll) 5.4.0.6, when Internet Explorer 6 is used, allows remote attackers to execute arbitrary code via a long argument to the (1) Send485CMD method, and possibly the (2) SetLoginID, (3) AddSite, (4) SetScreen, and (5) SetVideoServer methods. Desbordamiento de búfer en el controlado ActiveX BaseRunner en el módulo Ademco ATNBaseLoader100 (ATNBaseLoader100.dll) 5.4.0.6, cuando se está utilizando Internet Explorer 6, permite a atacantes remotos ejecutar código de su elección a través de argumentos largos en los métodos (1) Send485CMD , y posiblemente el (2) SetLoginID, (3) AddSite, (4) SetScreen, y (5) SetVideoServer. • https://www.exploit-db.com/exploits/3993 http://osvdb.org/36700 http://secunia.com/advisories/25430 http://www.securityfocus.com/bid/24172 http://www.vupen.com/english/advisories/2007/1958 https://exchange.xforce.ibmcloud.com/vulnerabilities/34548 •
CVE-2007-2856 – Dart Communications PowerTCP - Service Control Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2007-2856
Buffer overflow in the Dart Communications PowerTCP ZIP Compression ActiveX control in DartZip.dll 1.8.5.3, when Internet Explorer 6 is used, allows user-assisted remote attackers to execute arbitrary code via a long first argument to the QuickZip function, a related issue to CVE-2007-2855. Un desbordamiento de búfer en el control ActiveX de Dart Communications PowerTCP ZIP Compression en la biblioteca DartZip.dll versión 1.8.5.3, cuando se usa Internet Explorer versión 6, permite a los atacantes remotos asistidos por el usuario ejecutar código arbitrario por medio de un argumento first largo hacia la función QuickZip, un problema relacionado con CVE-2007-2855. • https://www.exploit-db.com/exploits/3982 https://www.exploit-db.com/exploits/3984 http://osvdb.org/38111 http://retrogod.altervista.org/ie_DartZip_bof.html http://www.securityfocus.com/archive/1/469503/100/0/threaded http://www.securityfocus.com/archive/1/469592/100/0/threaded http://www.securityfocus.com/bid/24142 http://www.securityfocus.com/bid/24163 https://exchange.xforce.ibmcloud.com/vulnerabilities/34494 https://exchange.xforce.ibmcloud.com/vulnerabilities/34520 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-0942
https://notcve.org/view.php?id=CVE-2007-0942
Microsoft Internet Explorer 5.01 SP4 on Windows 2000 SP4; 6 SP1 on Windows 2000 SP4; 6 and 7 on Windows XP SP2, or Windows Server 2003 SP1 or SP2; and possibly 7 on Windows Vista does not properly "instantiate certain COM objects as ActiveX controls," which allows remote attackers to execute arbitrary code via a crafted COM object from chtskdic.dll. Microsoft Internet Explorer versión 5.01 SP4 en Windows 2000 SP4; versión 6 SP1 en Windows 2000 SP4; versiones 6 y 7 en Windows XP SP2, o Windows Server 2003 SP1 o SP2; y posiblemente versión 7 en Windows Vista "instantiate certain COM objects as ActiveX controls" inapropiadamente, que permite a los atacantes remotos ejecutar código arbitrario por medio de un objeto COM creado de la biblioteca chtskdic.dll. • http://secunia.com/advisories/23769 http://www.osvdb.org/34399 http://www.securityfocus.com/archive/1/468871/100/200/threaded http://www.securitytracker.com/id?1018019 http://www.us-cert.gov/cas/techalerts/TA07-128A.html http://www.vupen.com/english/advisories/2007/1712 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-027 https://exchange.xforce.ibmcloud.com/vulnerabilities/33252 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval •