CVE-2005-2127

N/A Unknown
Published: August 19, 2005 Modified: April 16, 2026
View on NVD

Description

Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://isc.sans.org/diary.php?date=2005-08-18
Source: secure@microsoft.com
Third Party Advisory
http://secunia.com/advisories/16480
Source: secure@microsoft.com
Patch Vendor Advisory
http://secunia.com/advisories/17172
Source: secure@microsoft.com
Permissions Required Third Party Advisory
http://secunia.com/advisories/17223
Source: secure@microsoft.com
Permissions Required Third Party Advisory
http://secunia.com/advisories/17509
Source: secure@microsoft.com
Permissions Required Third Party Advisory
http://securityreason.com/securityalert/72
Source: secure@microsoft.com
Third Party Advisory
http://securitytracker.com/id?1014727
Source: secure@microsoft.com
Exploit Patch Third Party Advisory VDB Entry Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf
Source: secure@microsoft.com
Third Party Advisory
http://www.kb.cert.org/vuls/id/740372
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/898241
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/959049
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://www.microsoft.com/technet/security/advisory/906267.mspx
Source: secure@microsoft.com
Mitigation Patch Vendor Advisory
http://www.securityfocus.com/bid/14594
Source: secure@microsoft.com
Exploit Patch Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/15061
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA05-284A.html
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA05-347A.html
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA06-220A.html
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2005/1450
Source: secure@microsoft.com
Broken Link
http://isc.sans.org/diary.php?date=2005-08-18
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/16480
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/17172
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
http://secunia.com/advisories/17223
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
http://secunia.com/advisories/17509
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
http://securityreason.com/securityalert/72
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securitytracker.com/id?1014727
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch Third Party Advisory VDB Entry Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.kb.cert.org/vuls/id/740372
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/898241
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/959049
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.microsoft.com/technet/security/advisory/906267.mspx
Source: af854a3a-2127-422b-91ae-364da2661108
Mitigation Patch Vendor Advisory
http://www.securityfocus.com/archive/1/470690/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/14594
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/15061
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA05-284A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA05-347A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA06-220A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2005/1450
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/21895
Source: af854a3a-2127-422b-91ae-364da2661108
VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/34754
Source: af854a3a-2127-422b-91ae-364da2661108
VDB Entry

56 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
42.0%
97th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

ati microsoft