← Volver a CVEs
CVE-2007-2222
N/ADescripcion
Multiple buffer overflows in the (1) ActiveListen (Xlisten.dll) and (2) ActiveVoice (Xvoice.dll) speech controls, as used by Microsoft Internet Explorer 5.01, 6, and 7, allow remote attackers to execute arbitrary code via a crafted ActiveX object that triggers memory corruption, as demonstrated via the ModeName parameter to the FindEngine function in ACTIVEVOICEPROJECTLib.DirectSS.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado6/12/2007
Ultima modificacion4/23/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
microsoft:internet_explorermicrosoft:windows_2000microsoft:windows_2003_servermicrosoft:windows_vistamicrosoft:windows_xp
Debilidades (CWE)
CWE-119
Referencias
http://osvdb.org/35353(secure@microsoft.com)
http://retrogod.altervista.org/win_speech_2k_sp4.html(secure@microsoft.com)
http://retrogod.altervista.org/win_speech_xp_sp2.html(secure@microsoft.com)
http://secunia.com/advisories/25627(secure@microsoft.com)
http://securitytracker.com/id?1018235(secure@microsoft.com)
http://www.exploit-db.com/exploits/4065(secure@microsoft.com)
http://www.kb.cert.org/vuls/id/507433(secure@microsoft.com)
http://www.securityfocus.com/archive/1/471947/100/0/threaded(secure@microsoft.com)
http://www.securityfocus.com/bid/24426(secure@microsoft.com)
http://www.us-cert.gov/cas/techalerts/TA07-163A.html(secure@microsoft.com)
http://www.vupen.com/english/advisories/2007/2153(secure@microsoft.com)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033(secure@microsoft.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34630(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2031(secure@microsoft.com)
http://osvdb.org/35353(af854a3a-2127-422b-91ae-364da2661108)
http://retrogod.altervista.org/win_speech_2k_sp4.html(af854a3a-2127-422b-91ae-364da2661108)
http://retrogod.altervista.org/win_speech_xp_sp2.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/25627(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1018235(af854a3a-2127-422b-91ae-364da2661108)
http://www.exploit-db.com/exploits/4065(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/507433(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/471947/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/24426(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA07-163A.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2007/2153(af854a3a-2127-422b-91ae-364da2661108)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34630(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2031(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.