First published: Tue Jun 12 2007(Updated: )
Multiple buffer overflows in the (1) ActiveListen (Xlisten.dll) and (2) ActiveVoice (Xvoice.dll) speech controls, as used by Microsoft Internet Explorer 5.01, 6, and 7, allow remote attackers to execute arbitrary code via a crafted ActiveX object that triggers memory corruption, as demonstrated via the ModeName parameter to the FindEngine function in ACTIVEVOICEPROJECTLib.DirectSS.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | =sp4 | |
Internet Explorer | =5.01-sp4 | |
Internet Explorer | =6-sp1 | |
Microsoft Windows Server 2003 | =sp1 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows XP | ||
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp2 | |
Internet Explorer | =6 | |
Internet Explorer | =7.0 | |
Microsoft Windows Server 2003 | ||
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Server 2003 | =sp1 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Vista | =gold | |
Microsoft Windows Vista | =gold |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2222 has been classified as a critical vulnerability due to the potential for arbitrary code execution.
To address CVE-2007-2222, it is recommended to apply the latest security updates or patches provided by Microsoft for the affected versions of Internet Explorer.
CVE-2007-2222 impacts Internet Explorer versions 5.01, 6, and 7 on specific Windows platforms including Windows 2000 and Windows XP.
Attackers can exploit CVE-2007-2222 using crafted ActiveX objects that cause buffer overflows, leading to memory corruption.
If a patch cannot be applied, disabling ActiveX controls in Internet Explorer can serve as a temporary workaround to mitigate the risk from CVE-2007-2222.