HTTP: Microsoft Windows Data Access Components ADO Record Code Execution

This signature detects attempts to exploit a known vulnerability in Microsoft Windows Data Access Components (MDAC). It is due to the way that Microsoft Data Access Components allocates memory when handling the ActiveX Data Objects (ADO) Record data structures. Remote attackers can exploit this by enticing target users to visit a maliciously crafted Web page. A successful attack can result in arbitrary code execution with the privileges of the logged in user.

Extended Description

Microsoft Data Access Components are prone to a remote memory-corruption vulnerability. An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage. Successful exploits will allow the attacker to execute arbitrary code within the context of the application. Failed exploit attempts will result in a denial-of-service condition. NOTE: This issue was originally reported at the 2010 CanSecWest conference as part of the Pwn2Own contest. It was also previously documented in BID 38951 (Microsoft Internet Explorer Unspecified Remote Code Execution Vulnerabilities) but has been moved here to better document it.

Affected Products

Avaya messaging_application_server,Avaya meeting_exchange

References

BugTraq: 45698

CVE: CVE-2011-0027

Short Name
HTTP:STC:IE:WIN-ADO-EXEC
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
ADO Access CVE-2011-0027 Code Components Data Execution Microsoft Record Windows bid:45698
Release Date
01/19/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Microsoft

Avaya

CVSS Score

9.3

Found a potential security threat?