Published: 2009-07-31T22:03+00:00
Last Updated: 2009-08-23T23:08+00:00
JVNTR-2009-19
Microsoft Windows, Internet Explorer, and Active Template Library (ATL) Vulnerabilities (TA09-209A)
Overview
Microsoft has released out-of-band updates to address critical vulnerabilities in Microsoft Internet Explorer running on most supported versions of Windows. The updates also help mitigate attacks against ActiveX controls developed with vulnerable versions of the Microsoft Active Template Library (ATL).
Event Information
Date (UTC) | Description |
2009-07-30 20:47 |
US-CERT Adobe Releases Shockwave Player Update and Flash Player Security Advisory US-CERT Current Activity Additionally, Adobe has released Flash Player 10.0.22.87 and 9.0.246.0 to address the ATL issue and additional vulnerabilities in Flash Player. Exploitation of these vulnerabilities may allow an attacker to execute arbitrary code. |
2009-07-30 13:34 |
Adobe APSB09-10: Security Updates available for Adobe Flash Player Adobe recommends users of Adobe Flash Player 9.x and 10.x and earlier versions update to Adobe Flash Player 9.0.246.0 and 10.0.32.18. Adobe recommends users of Adobe AIR version 1.5.1 and earlier versions update to Adobe AIR 1.5.2. |
2009-07-29 14:12 |
US-CERT Adobe Releases Shockwave Player Update and Flash Player Security Advisory US-CERT Current Activity Adobe has released Shockware Player 11.5.1.601 because previous versions used a vulnerable version of the Microsoft Active Template Library (ATL). Additionally, Adobe has released a security advisory to address the same issue in Flash Player. Exploitation of this vulnerability may allow an attacker to execute arbitrary code. |
2009-07-29 04:44 |
JPCERT/CC JPCERT-AT-2009-0014: Vulnerabilities in Microsoft ATL affect Multiple Products |
2009-07-28 22:58 |
SANS Internet Storm Center MS released two OOB bulletins and an advisory (Version: 2) Microsoft has released two Out of Band (OOB) bulletins and one advisory. |
2009-07-28 22:40 |
Microsoft ms09-jul: Microsoft Security Bulletin Summary for July 2009 (out-of-band) For the out-of-band security bulletins added to Version 2.0 of this bulletin summary, MS09-034 and MS09-035. |
2009-07-28 21:56 |
US-CERT TA09-209A: Microsoft Windows, Internet Explorer, and Active Template Library (ATL) Vulnerabilities Via US-CERT Mailing List |
2009-07-28 21:29 |
Microsoft Microsoft Security Advisory (973882): Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution Advisory published. |
2009-07-28 18:00 |
Cisco Systems cisco-sa-20090728-activex: Active Template Library (ATL) Vulnerability Certain Cisco products that use Microsoft Active Template Libraries (ATL) and headers may be vulnerable to remote code execution. In some instances, the vulnerability may be exploited against Microsoft Internet Explorer to perform kill bit bypass. In order to exploit this vulnerability, an attacker must convince a user to visit a malicious web site. |
2009-07-28 17:18 |
US-CERT Microsoft Releases Two Out-of-Band Security Bulletins and a Security Advisory US-CERT Current Activity Microsoft has released two out-of-band security bulletins. The first bulletin, MS09-034, is a cumulative security update for Internet Explorer that addresses several vulnerabilities. These vulnerabilities may allow a remote attacker to execute arbitrary code. The second bulletin, MS09-035, addresses vulnerabilities in the Visual Studio Active Template Library (ATL). Exploitation of these vulnerabilities may allow an attacker to execute arbitrary code. |
2009-07-28 17:15 |
Symantec ThreatCON (2) => (2) Microsoft has released two out-of-band security bulletins, MS09-034 and MS09-035, that address vulnerabilities in the Visual Studio Active Template Library (ATL) and Internet Explorer. Users should apply patches immediately. |
2009-07-28 10:10 |
Adobe APSA09-04: Security advisory for Adobe Flash Player Adobe Flash Player 9.0.159.0 and 10.0.22.87, and earlier 9.x and 10.x versions installed on Windows operating systems for use with Internet Explorer leverage a vulnerable version of the Microsoft Active Template Library (ATL) described in Microsoft Security Advisory (973882). |
2009-07-28 10:10 |
Adobe APSB09-11: Security Update available for Shockwave Player Adobe Shockwave Player 11.5.0.600 and earlier versions on Windows leverages a vulnerable version of the Microsoft Active Template Library (ATL) described in Microsoft Security Advisory (973882). |
2009-07-24 23:45 |
Microsoft ms09-jul: Microsoft Security Bulletin Advance Notification for July 2009 (out-of-band) This is an advance notification of two out-of-band security bulletins that Microsoft is intending to release on July 28, 2009. One bulletin will be for the Microsoft Visual Studio product line; application developers should be aware of updates available affecting certain types of applications. The second bulletin contains defense-in-depth changes to Internet Explorer to address attack vectors related to the Visual Studio bulletin, as well as fixes for unrelated vulnerabilities that are rated Critical. Customers who are up to date on their security updates are protected from known attacks related to this out-of-band release. |
2009-07-24 23:33 |
SANS Internet Storm Center Microsoft Out of Band Patch Several readers have pointed out that Microsoft has provided notification of an Out-of-Band patch to be released this coming Tuesday, July 28th. |
2009-05-06 |
iDefense Microsoft Internet Explorer HTML TIME 'ondatasetcomplete' Use After Free Vulnerability Memory Corruption Vulnerability (CVE-2009-1917, MS09-034) Vulnerability Reported The vulnerability occurs when the 'ondatasetcomplete' event method of a timeChildren object is referenced. If this occurs when the object is in an inconsistent state, a heap chunk will be freed, and then reused after being freed. This results in an uninitialized VTABLE being used, which can result in the execution of arbitrary code when the pointer is dereferenced. |
2009-04-28 |
Zero Day Initiative (ZDI) ZDI-09-048: Microsoft Internet Explorer CSS Behavior Memory Corruption Vulnerability Uninitialized Memory Corruption Vulnerability (CVE-2009-1919, MS09-034) Vulnerability Reported The specific flaw exists when accessing embedded style sheets within an HTML file. When modifying the properties of rules defined in the style the behavior element is improperly processed resulting in a memory corruption which can be further leveraged to execute arbitrary code under the context of the current user. |
2009-04-28 |
Zero Day Initiative (ZDI) ZDI-09-047: Microsoft Internet Explorer getElementsByTagName Memory Corruption Vulnerability HTML Objects Memory Corruption Vulnerability (CVE-2009-1918, MS09-034) Vulnerability Reported The specific flaw exists in the appending of elements to an invalid object. When appending malformed elements to a empty DIV element memory corruption can occur. A properly constructed web page can result in remote code execution under the context of the current user. |
2008-12-05 |
iDefense Multiple Vendor Microsoft ATL/MFC ActiveX Security Bypass Vulnerability ATL COM Initialization Vulnerability (CVE-2009-2493, MS09-035, MS09-037) Vulnerability Reported Exploitation of this vulnerability allows an attacker to bypass security checks (such as kill-bits in Internet Explorer). Successful exploitation would require the attacker to convince his or her victim into visiting a specially crafted Web page leveraging the vulnerability. While there is no way to forcibly make a victim visit a website, exploitation may occur through normal Web browsing. |
2008-12-05 |
iDefense Multiple Vendor Microsoft ATL/MFC ActiveX Information Disclosure Vulnerability ATL Null String Vulnerability (CVE-2009-2495, MS09-035) Vulnerability Reported Depending upon certain characteristics of an OLE component designed with the Microsoft ATL, it is possible to read arbitrary memory inside the Internet Explorer process. By loading a vulnerable ActiveX control and passing in specially crafted persistent storage data, an attacker can cause a string to be read in without being properly NULL terminated. After the object is initialized the attacker may read the data using Java Script. Since the string functions rely on NULL termination to keep track of the end of the string, the attacker may read into the next chunk of memory continuing until two NULL bytes are encountered. |