ID CVE-2005-2087
Summary Internet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem.
References
Vulnerable Configurations
  • Microsoft Internet Explorer 5.1
    cpe:2.3:a:microsoft:ie:5.1
  • cpe:2.3:a:microsoft:ie:5.1:-:mac_os
    cpe:2.3:a:microsoft:ie:5.1:-:mac_os
  • Microsoft Internet Explorer 5.01 Service Pack 4
    cpe:2.3:a:microsoft:ie:5.01:sp4
  • cpe:2.3:a:microsoft:ie:5.2.3:-:macintosh
    cpe:2.3:a:microsoft:ie:5.2.3:-:macintosh
  • Microsoft ie 5.5
    cpe:2.3:a:microsoft:ie:5.5
  • Microsoft Internet Explorer 5.5 preview
    cpe:2.3:a:microsoft:ie:5.5:preview
  • Microsoft Internet Explorer 5.5 SP1
    cpe:2.3:a:microsoft:ie:5.5:sp1
  • Microsoft Internet Explorer 5.5 SP2
    cpe:2.3:a:microsoft:ie:5.5:sp2
  • cpe:2.3:a:microsoft:ie:6:windows_server_2003_sp1
    cpe:2.3:a:microsoft:ie:6:windows_server_2003_sp1
  • Microsoft Internet Explorer 6.0
    cpe:2.3:a:microsoft:ie:6.0
  • Microsoft Internet Explorer 6.0.2900.2180
    cpe:2.3:a:microsoft:ie:6.0.2900.2180
CVSS
Base: 5.0 (as of 05-07-2005 - 13:59)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
exploit-db via4
description MS Internet Explorer (javaprxy.dll) COM Object Remote Exploit. CVE-2005-2087. Remote exploit for windows platform
id EDB-ID:1079
last seen 2016-01-31
modified 2005-07-05
published 2005-07-05
reporter k-otik
source https://www.exploit-db.com/download/1079/
title Microsoft Internet Explorer javaprxy.dll COM Object Remote Exploit
nessus via4
NASL family Windows : Microsoft Bulletins
NASL id SMB_NT_MS05-037.NASL
description The remote host contains a version of the JView Profiler module that is vulnerable to a security flaw that may allow an attacker to execute arbitrary code on the remote host by constructing a malicious web page and enticing a victim to visit this web page.
last seen 2019-02-21
modified 2018-11-15
plugin id 18682
published 2005-07-12
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=18682
title MS05-037: Vulnerability in JView Profiler Could Allow Code Execution (903235)
oval via4
  • accepted 2014-02-24T04:00:14.351-05:00
    class vulnerability
    contributors
    • name Harvey Rubinovitz
      organization The MITRE Corporation
    • name Jonathan Baker
      organization The MITRE Corporation
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Maria Mikhno
      organization ALTX-SOFT
    description Internet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem.
    family windows
    id oval:org.mitre.oval:def:1326
    status accepted
    submitted 2005-08-18T04:00:00.000-04:00
    title IE5.01,SP4 Java Proxy COM Object Instantiation Memory Corruption Vulnerability
    version 67
  • accepted 2014-02-24T04:00:18.533-05:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Maria Mikhno
      organization ALTX-SOFT
    description Internet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem.
    family windows
    id oval:org.mitre.oval:def:1506
    status accepted
    submitted 2005-12-26T09:36:00.000-04:00
    title IE6,SP1 Java Proxy COM Object Instantiation Memory Corruption Vulnerability
    version 66
  • accepted 2014-02-24T04:00:19.108-05:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    • name Maria Mikhno
      organization ALTX-SOFT
    description Internet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem.
    family windows
    id oval:org.mitre.oval:def:1518
    status accepted
    submitted 2005-12-26T09:36:00.000-04:00
    title IE6:S03 Java Proxy COM Object Instantiation Memory Corruption Vulnerability
    version 70
  • accepted 2014-02-24T04:03:27.734-05:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Maria Mikhno
      organization ALTX-SOFT
    description Internet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem.
    family windows
    id oval:org.mitre.oval:def:793
    status accepted
    submitted 2005-12-26T09:36:00.000-04:00
    title IE6:XP,SP2 Java Proxy COM Object Instantiation Memory Corruption Vulnerability
    version 65
refmap via4
auscert ESB-2005.0489
bid 14087
bugtraq
  • 20050629 SEC-CONSULT SA-20050629-0
  • 20050702 Microsoft Internet Explorer "javaprxy.dll" Code Execution Exploit
cert TA05-193A
cert-vn
  • VU#939605
  • VU#959049
misc http://www.microsoft.com/technet/security/advisory/903144.mspx
ms MS05-037
osvdb 17680
sectrack 1014329
secunia 15891
vupen ADV-2005-0935
xf ie-javaprxydll-execute-code(21193)
saint via4
bid 14087
description Internet Explorer Javaprxy.dll heap overflow
id win_patch_ie_javaprxy
osvdb 17680
title ie_javaprxy
type client
Last major update 17-10-2016 - 23:24
Published 05-07-2005 - 00:00
Last modified 12-10-2018 - 17:36
Back to Top