{"vuid":"VU#641460","idnumber":"641460","name":"Microsoft Windows fails to properly handle COM objects","keywords":["Microsoft","Windows","Explorer","remote code execution","COM objects","ms06-apr"],"overview":"Microsoft Windows fails to properly handle COM Objects. This vulnerability may allow a remote unauthenticated attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Microsoft COM \nMicrosoft COM is a technology that allows programmers to create reusable software components that can be incorporated into applications to extend their functionality. Microsoft COM includes COM+, Distributed COM (DCOM), and ActiveX Controls. The Problem Microsoft COM objects are not properly handled. Specifically, users are not properly warned before COM objects are executed. More information is available in Microsoft Security Bulletin MS06-015.","impact":"A remote attacker may be able to execute arbitrary code on a vulnerable system. The attacker-supplied code would be executed with the privileges of the user running Windows Explorer.","resolution":"Apply an Update\nThis issue is addressed in Microsoft Security Bulletin MS06-015. Some problems associated with the update (verclsid.exe) and resolutions are described in Microsoft Knowledge Base Article 918165.","workarounds":"Refer to MS06-015 Refer to Microsoft Security Bulletin MS06-015 for workarounds for this vulnerability.","sysaffected":"","thanks":"This vulnerability was reported in Microsoft  Security Bulletin \nMS06-015\n. Microsoft credits \nNISCC\n with providing information regarding this vulnerability.","author":"This document was written by Jeff Gennari.","public":["http://www.microsoft.com/technet/security/Bulletin/MS06-015.mspx","http://support.microsoft.com/kb/918165","http://secunia.com/advisories/19606/"],"cveids":["CVE-2006-0012"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-04-11T18:11:39Z","publicdate":"2006-04-11T00:00:00Z","datefirstpublished":"2006-04-11T19:28:38Z","dateupdated":"2006-05-15T17:18:05Z","revision":15,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"20","cam_impact":"18","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"27","cam_scorecurrentwidelyknown":"33.75","cam_scorecurrentwidelyknownexploited":"60.75","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":27.0,"vulnote":null}