← Retour aux CVEs
CVE-2007-2222
N/ADescription
Multiple buffer overflows in the (1) ActiveListen (Xlisten.dll) and (2) ActiveVoice (Xvoice.dll) speech controls, as used by Microsoft Internet Explorer 5.01, 6, and 7, allow remote attackers to execute arbitrary code via a crafted ActiveX object that triggers memory corruption, as demonstrated via the ModeName parameter to the FindEngine function in ACTIVEVOICEPROJECTLib.DirectSS.
Details CVE
Score CVSS v3.1N/A
Publie6/12/2007
Derniere modification4/23/2026
Sourcenvd
Observations honeypot0
Produits affectes
microsoft:internet_explorermicrosoft:windows_2000microsoft:windows_2003_servermicrosoft:windows_vistamicrosoft:windows_xp
Faiblesses (CWE)
CWE-119
References
http://osvdb.org/35353(secure@microsoft.com)
http://retrogod.altervista.org/win_speech_2k_sp4.html(secure@microsoft.com)
http://retrogod.altervista.org/win_speech_xp_sp2.html(secure@microsoft.com)
http://secunia.com/advisories/25627(secure@microsoft.com)
http://securitytracker.com/id?1018235(secure@microsoft.com)
http://www.exploit-db.com/exploits/4065(secure@microsoft.com)
http://www.kb.cert.org/vuls/id/507433(secure@microsoft.com)
http://www.securityfocus.com/archive/1/471947/100/0/threaded(secure@microsoft.com)
http://www.securityfocus.com/bid/24426(secure@microsoft.com)
http://www.us-cert.gov/cas/techalerts/TA07-163A.html(secure@microsoft.com)
http://www.vupen.com/english/advisories/2007/2153(secure@microsoft.com)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033(secure@microsoft.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34630(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2031(secure@microsoft.com)
http://osvdb.org/35353(af854a3a-2127-422b-91ae-364da2661108)
http://retrogod.altervista.org/win_speech_2k_sp4.html(af854a3a-2127-422b-91ae-364da2661108)
http://retrogod.altervista.org/win_speech_xp_sp2.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/25627(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1018235(af854a3a-2127-422b-91ae-364da2661108)
http://www.exploit-db.com/exploits/4065(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/507433(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/471947/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/24426(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA07-163A.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2007/2153(af854a3a-2127-422b-91ae-364da2661108)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34630(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2031(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.