← Voltar para CVEs
CVE-2007-2222
N/ADescricao
Multiple buffer overflows in the (1) ActiveListen (Xlisten.dll) and (2) ActiveVoice (Xvoice.dll) speech controls, as used by Microsoft Internet Explorer 5.01, 6, and 7, allow remote attackers to execute arbitrary code via a crafted ActiveX object that triggers memory corruption, as demonstrated via the ModeName parameter to the FindEngine function in ACTIVEVOICEPROJECTLib.DirectSS.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado6/12/2007
Ultima modificacao4/23/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
microsoft:internet_explorermicrosoft:windows_2000microsoft:windows_2003_servermicrosoft:windows_vistamicrosoft:windows_xp
Fraquezas (CWE)
CWE-119
Referencias
http://osvdb.org/35353(secure@microsoft.com)
http://retrogod.altervista.org/win_speech_2k_sp4.html(secure@microsoft.com)
http://retrogod.altervista.org/win_speech_xp_sp2.html(secure@microsoft.com)
http://secunia.com/advisories/25627(secure@microsoft.com)
http://securitytracker.com/id?1018235(secure@microsoft.com)
http://www.exploit-db.com/exploits/4065(secure@microsoft.com)
http://www.kb.cert.org/vuls/id/507433(secure@microsoft.com)
http://www.securityfocus.com/archive/1/471947/100/0/threaded(secure@microsoft.com)
http://www.securityfocus.com/bid/24426(secure@microsoft.com)
http://www.us-cert.gov/cas/techalerts/TA07-163A.html(secure@microsoft.com)
http://www.vupen.com/english/advisories/2007/2153(secure@microsoft.com)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033(secure@microsoft.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34630(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2031(secure@microsoft.com)
http://osvdb.org/35353(af854a3a-2127-422b-91ae-364da2661108)
http://retrogod.altervista.org/win_speech_2k_sp4.html(af854a3a-2127-422b-91ae-364da2661108)
http://retrogod.altervista.org/win_speech_xp_sp2.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/25627(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1018235(af854a3a-2127-422b-91ae-364da2661108)
http://www.exploit-db.com/exploits/4065(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/507433(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/471947/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/24426(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA07-163A.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2007/2153(af854a3a-2127-422b-91ae-364da2661108)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34630(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2031(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.