spacer Secunia
spacer spacer

spacer
spacer Overview spacer
spacer Advisories spacer
spacer Research spacer
spacer Forums spacer
spacer Create Profile spacer
spacer Our Commitment spacer
spacer Database spacer
spacer Search spacer
spacer Advisories by Product spacer
spacer Advisories by Vendor spacer
spacer Terminology spacer
spacer Report Vulnerability spacer
spacer Insecure Library Loading spacer

Secunia Advisory SA15891

Internet Explorer "javaprxy.dll" Memory Corruption Vulnerability
Secunia Advisory SA15891
spacer


spacer
Release Date 2005-07-01
Last Update 2005-11-21
   
Popularity 60,868 views
Comments 0 comments

Criticality level Extremely criticalspacer
Impact System access
Where From remote
Authentication level Available in Customer Area
   
Report reliability Available in Customer Area
Solution Status Vendor Patch
   
Systems affected Available in Customer Area
Approve distribution Available in Customer Area
Remediation status Secunia CSI, Secunia PSI
Automated scanning Secunia CSI, Secunia PSI
   
Software:
spacer Microsoft Internet Explorer 5.01
spacer Microsoft Internet Explorer 5.5
spacer Microsoft Internet Explorer 6.x

Secunia CVSS Score Available in Customer Area
CVE Reference(s) CVE-2005-2087 CVSS available in Customer Area
  

Description

SEC Consult has discovered a vulnerability in Microsoft Internet Explorer, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to the JView Profiler (javaprxy.dll) COM object being instantiated incorrectly in Internet Explorer via the object tag. This can be exploited via a malicious web site to cause a memory corruption.

Successful exploitation allows execution of arbitrary code, but requires that the file "javaprxy.dll" exists on the system.

NOTE: "javaprxy.dll" is included with Microsoft Java Virtual Machine. Exploit code is publicly available.

The vulnerability has been confirmed on a fully patched system with Internet Explorer 6.0, Microsoft VM (virtual machine) build 3802 and Microsoft Windows XP SP2. Internet Explorer 5.01 and 5.5 is reportedly also affected.


Solution
Apply patches:
Further details available in Customer Area

Provided and/or discovered by
sk0L and Martin Eiszner, SEC Consult.

Changelog
Further details available in Customer Area

Original Advisory
MS05-037 (903235):
www.microsoft.com/technet/security/Bulletin/MS05-037.mspx

Microsoft:
www.microsoft.com/technet/security/advisory/903144.mspx

SEC Consult:
www.sec-consult.com/184.html

Other references
Further details available in Customer Area

Deep Links
Links available in Customer Area


Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Internet Explorer "javaprxy.dll" Memory Corruption Vulnerability
 
No posts yet

spacer

You must be logged in to post a comment.




 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports & Papers
Webinars
Events
 About us
Careers
Memberships
Newsroom


spacer spacer spacer spacer spacer spacer spacer
 
spacer © 2002-2012 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability
spacer spacer spacer spacer spacer spacer
Secunia Advisory -->
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.