CWE
20
Advisory Published
Updated

CVE-2006-5559: Input Validation

First published: Fri Oct 27 2006(Updated: )

The Execute method in the ADODB.Connection 2.7 and 2.8 ActiveX control objects (ADODB.Connection.2.7 and ADODB.Connection.2.8) in the Microsoft Data Access Components (MDAC) 2.5 SP3, 2.7 SP1, 2.8, and 2.8 SP1 does not properly track freed memory when the second argument is a BSTR, which allows remote attackers to cause a denial of service (Internet Explorer crash) and possibly execute arbitrary code via certain strings in the second and third arguments.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Microsoft Windows 2000=sp4
Microsoft Data Access Components=2.5-sp3
Microsoft Windows XP=sp2
Microsoft Data Access Components=2.8-sp1
Microsoft Windows 2003 Server
Microsoft Windows 2003 Server=itanium
Microsoft Data Access Components=2.8
Microsoft Data Access Components=2.7-sp1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2006-5559?

    CVE-2006-5559 is considered a critical vulnerability due to its potential for remote code execution.

  • How do I fix CVE-2006-5559?

    To fix CVE-2006-5559, you should apply the latest security patches and updates for Microsoft Data Access Components.

  • Which versions of software are affected by CVE-2006-5559?

    CVE-2006-5559 affects Microsoft Data Access Components 2.5 SP3, 2.7 SP1, 2.8, and 2.8 SP1.

  • What can exploit CVE-2006-5559?

    CVE-2006-5559 can be exploited via maliciously crafted input sent to the ADODB.Connection object.

  • Is my system safe from CVE-2006-5559 if I use updated Windows versions?

    If you are using updated versions of Windows that are not reliant on the vulnerable versions of Microsoft Data Access Components, your system is safer from CVE-2006-5559.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203