First published: Fri Oct 27 2006(Updated: )
The Execute method in the ADODB.Connection 2.7 and 2.8 ActiveX control objects (ADODB.Connection.2.7 and ADODB.Connection.2.8) in the Microsoft Data Access Components (MDAC) 2.5 SP3, 2.7 SP1, 2.8, and 2.8 SP1 does not properly track freed memory when the second argument is a BSTR, which allows remote attackers to cause a denial of service (Internet Explorer crash) and possibly execute arbitrary code via certain strings in the second and third arguments.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | =sp4 | |
Microsoft Data Access Components | =2.5-sp3 | |
Microsoft Windows XP | =sp2 | |
Microsoft Data Access Components | =2.8-sp1 | |
Microsoft Windows 2003 Server | ||
Microsoft Windows 2003 Server | =itanium | |
Microsoft Data Access Components | =2.8 | |
Microsoft Data Access Components | =2.7-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5559 is considered a critical vulnerability due to its potential for remote code execution.
To fix CVE-2006-5559, you should apply the latest security patches and updates for Microsoft Data Access Components.
CVE-2006-5559 affects Microsoft Data Access Components 2.5 SP3, 2.7 SP1, 2.8, and 2.8 SP1.
CVE-2006-5559 can be exploited via maliciously crafted input sent to the ADODB.Connection object.
If you are using updated versions of Windows that are not reliant on the vulnerable versions of Microsoft Data Access Components, your system is safer from CVE-2006-5559.