First published: Wed Jul 29 2009(Updated: )
The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold and SP1, and Visual C++ 2005 SP1 and 2008 Gold and SP1 does not properly enforce string termination, which allows remote attackers to obtain sensitive information via a crafted HTML document with an ATL (1) component or (2) control that triggers a buffer over-read, related to ATL headers and buffer allocation, aka "ATL Null String Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Visual C++ | =2008-sp1_redistribution_pkg | |
Microsoft Visual Studio | =2003-sp1 | |
Microsoft Visual Studio | =2005-sp1 | |
Microsoft Visual Studio | =2008-sp1 | |
Microsoft Visual Studio | =2008 | |
Microsoft Visual C++ | =2008-redistribution_pkg | |
Microsoft Visual Studio | =2005-sp1 | |
Microsoft Visual C++ | =2005-sp1_redistribution_pkg |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2495 has a high severity due to potential sensitive information disclosure.
To fix CVE-2009-2495, apply the latest security updates from Microsoft for the affected software versions.
CVE-2009-2495 affects Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1, Visual Studio 2008, and their respective Visual C++ versions.
Yes, CVE-2009-2495 can be exploited remotely through a crafted HTML document.
Exploiting CVE-2009-2495 may allow attackers to obtain sensitive information from the affected applications.