CVE-2008-0015

KEV
Published: Lug 07, 2009 Last Modified: Feb 18, 2026
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 8,8
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: required
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
HIGH 9,3
Access Vector: network
Access Complexity: medium
Authentication: none
Confidentiality: complete
Integrity: complete
Availability: complete

Description

AI Translation Available

Stack-based buffer overflow in the CComVariant::ReadFromStream function in the Active Template Library (ATL), as used in the MPEG2TuneRequest ActiveX control in msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted web page, as exploited in the wild in July 2009, aka 'Microsoft Video ActiveX Control Vulnerability.'

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,8752
Percentile
1,0th
Updated

EPSS Score Trend (Last 90 Days)

119

Improper Restriction of Operations within the Bounds of a Memory Buffer

Stable
Common Consequences
Security Scopes Affected:
Integrity Confidentiality Availability
Potential Impacts:
Execute Unauthorized Code Or Commands Modify Memory Read Memory Dos: Crash, Exit, Or Restart Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory)
Applicable Platforms
Languages: Assembly, C, C++, Memory-Unsafe
View CWE Details
121

Stack-based Buffer Overflow

Draft
Common Consequences
Security Scopes Affected:
Availability Integrity Confidentiality Access Control Other
Potential Impacts:
Modify Memory Dos: Crash, Exit, Or Restart Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory) Execute Unauthorized Code Or Commands Bypass Protection Mechanism Other
Applicable Platforms
Languages: C, C++, Memory-Unsafe
View CWE Details
Exploit

Microsoft Internet Explorer 7 Video - ActiveX Remote …

Verified

Microsoft Internet Explorer 7 Video - ActiveX Remote Buffer Overflow

View Exploit Code →
Exploit

Microsoft DirectShow - 'msvidctl.dll' MPEG-2 Memory Corruption (MS09-032/MS09-037) …

Verified Metasploit Framework (MSF)

Microsoft DirectShow - 'msvidctl.dll' MPEG-2 Memory Corruption (MS09-032/MS09-037) (Metasploit)

View Exploit Code →
Operating System

Windows Xp by Microsoft

cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows Xp by Microsoft

cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows 2003 Server by Microsoft

cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows 2003 Server by Microsoft

cpe:2.3:o:microsoft:windows_2003_server:-:sp2:x64:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows 2003 Server by Microsoft

cpe:2.3:o:microsoft:windows_2003_server:-:sp2:itanium:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows Xp by Microsoft

cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2008…
http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s…
http://isc.sans.org/diary.html?storyid=6733
http://osvdb.org/55651
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-0…
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-0…
http://secunia.com/advisories/36187
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%…
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%…
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%…
http://www.csis.dk/dk/nyheder/nyheder.asp?tekstID=799
http://www.iss.net/threats/329.html
http://www.kb.cert.org/vuls/id/180513
http://www.microsoft.com/technet/security/advisory/972890.mspx
http://www.securityfocus.com/bid/35558
http://www.securityfocus.com/bid/35585
http://www.securitytracker.com/id?1022514
http://www.us-cert.gov/cas/techalerts/TA09-187A.html
http://www.us-cert.gov/cas/techalerts/TA09-195A.html
http://www.us-cert.gov/cas/techalerts/TA09-223A.html
http://www.vupen.com/english/advisories/2009/2232
http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s…
http://isc.sans.org/diary.html?storyid=6733
http://osvdb.org/55651
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-0…
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-0…
http://secunia.com/advisories/36187
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%…
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%…
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%…
http://www.csis.dk/dk/nyheder/nyheder.asp?tekstID=799
http://www.iss.net/threats/329.html
http://www.kb.cert.org/vuls/id/180513
http://www.microsoft.com/technet/security/advisory/972890.mspx
http://www.securityfocus.com/bid/35558
http://www.securityfocus.com/bid/35585
http://www.securitytracker.com/id?1022514
http://www.us-cert.gov/cas/techalerts/TA09-187A.html
http://www.us-cert.gov/cas/techalerts/TA09-195A.html
http://www.us-cert.gov/cas/techalerts/TA09-223A.html
http://www.vupen.com/english/advisories/2009/2232