Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
The Execute method in the ADODB.Connection 2.7 and 2.8 ActiveX control objects (ADODB.Connection.2.7 and ADODB.Connection.2.8) in the Microsoft Data Access Components (MDAC) 2.5 SP3, 2.7 SP1, 2.8, and 2.8 SP1 does not properly track freed memory when the second argument is a BSTR, which allows remote attackers to cause a denial of service (Internet Explorer crash) and possibly execute arbitrary code via certain strings in the second and third arguments.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Microsoft IE ADODB.Connection对象Execute函数内存破坏漏洞
Vulnerability Description
Internet Explorer是微软发布的非常流行的WEB浏览器。 IE中ADODB.Connection ActiveX对象的Execute()函数存在内存破坏漏洞,远程攻击者可以通过诱骗用户访问恶意WEB页面或HTML文档导致浏览器崩溃或执行任意代码。 Execute()函数允许恶意脚本以绕过脚本解释程序内存管理器的方式释放堆内存。Execute的第二个参数是一个变量,传送给了VariantClear,如果变量代表BSTR的话就会使用SysFreeString释放相关的字符串内存。脚本解释程序无法
CVSS Information
N/A
Vulnerability Type
N/A