First published: Tue Aug 14 2007(Updated: )
The tblinf32.dll (aka vstlbinf.dll) ActiveX control for Internet Explorer 5.01, 6 SP1, and 7 uses an incorrect IObjectsafety implementation, which allows remote attackers to execute arbitrary code by requesting the HelpString property, involving a crafted DLL file argument to the TypeLibInfoFromFile function, which overwrites the HelpStringDll property to call the DLLGetDocumentation function in another DLL file, aka "ActiveX Object Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =6-sp1 | |
Internet Explorer | =7 | |
Internet Explorer | =5.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2216 is considered a critical vulnerability due to its potential for remote code execution.
To fix CVE-2007-2216, users should update their Internet Explorer to the latest version available from Microsoft.
CVE-2007-2216 affects Internet Explorer versions 5.01, 6 SP1, and 7.
Attackers can exploit CVE-2007-2216 to execute arbitrary code on the victim's system.
CVE-2007-2216 is classified as a remote vulnerability, allowing exploitation over the internet.