Zero-day vulnerability in Visual Studio

Buffer overflow

This vulnerability was publicly reported by Michal Bucko and H D Moore.

Vulnerability details

Advisory: SB2006103104 - Remote code execution in Visual Studio WMIObjectBroker2 ActiveX control

Vulnerable component: Visual Studio

CVE-ID: CVE-2006-4704

CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C

CWE-ID: CWE-119 - Memory corruption


The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to incorrect handling of input data in Microsoft WMIScriptUtils.WMIObjectBroker2 ActiveX control (WmiScriptUtils.dll), bundled with Visual Studio 2005. A remote unauthenticated attacker can trick the victim to open a specially crafted web page or HTML file and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may allow an attacker to compromise vulnerable system.

Note: this vulnerability is being actively exploited.

Public Exploits: