← Back to CVEs
CVE-2007-2222
N/ADescription
Multiple buffer overflows in the (1) ActiveListen (Xlisten.dll) and (2) ActiveVoice (Xvoice.dll) speech controls, as used by Microsoft Internet Explorer 5.01, 6, and 7, allow remote attackers to execute arbitrary code via a crafted ActiveX object that triggers memory corruption, as demonstrated via the ModeName parameter to the FindEngine function in ACTIVEVOICEPROJECTLib.DirectSS.
CVE Details
CVSS v3.1 ScoreN/A
Published6/12/2007
Last Modified4/23/2026
Sourcenvd
Honeypot Sightings0
Affected Products
microsoft:internet_explorermicrosoft:windows_2000microsoft:windows_2003_servermicrosoft:windows_vistamicrosoft:windows_xp
Weaknesses (CWE)
CWE-119
References
http://osvdb.org/35353(secure@microsoft.com)
http://retrogod.altervista.org/win_speech_2k_sp4.html(secure@microsoft.com)
http://retrogod.altervista.org/win_speech_xp_sp2.html(secure@microsoft.com)
http://secunia.com/advisories/25627(secure@microsoft.com)
http://securitytracker.com/id?1018235(secure@microsoft.com)
http://www.exploit-db.com/exploits/4065(secure@microsoft.com)
http://www.kb.cert.org/vuls/id/507433(secure@microsoft.com)
http://www.securityfocus.com/archive/1/471947/100/0/threaded(secure@microsoft.com)
http://www.securityfocus.com/bid/24426(secure@microsoft.com)
http://www.us-cert.gov/cas/techalerts/TA07-163A.html(secure@microsoft.com)
http://www.vupen.com/english/advisories/2007/2153(secure@microsoft.com)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033(secure@microsoft.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34630(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2031(secure@microsoft.com)
http://osvdb.org/35353(af854a3a-2127-422b-91ae-364da2661108)
http://retrogod.altervista.org/win_speech_2k_sp4.html(af854a3a-2127-422b-91ae-364da2661108)
http://retrogod.altervista.org/win_speech_xp_sp2.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/25627(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1018235(af854a3a-2127-422b-91ae-364da2661108)
http://www.exploit-db.com/exploits/4065(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/507433(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/471947/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/24426(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA07-163A.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2007/2153(af854a3a-2127-422b-91ae-364da2661108)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34630(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2031(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.