Stack-based buffer overflow in msiexec.exe 3.1.4000.1823 and 4.5.6001.22159 in Microsoft Windows Installer allows context-dependent attackers to execute arbitrary code via a long GUID value for the /x (aka /uninstall) option. NOTE: this issue might cross privilege boundaries if msiexec.exe is reachable via components such as ActiveX controls, and might additionally require a separate vulnerability in the control.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.aushack.com/200806-msiexec.txt - Exploit | |
References | () http://www.securityfocus.com/archive/1/492961/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/492986/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/492992/100/0/threaded - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/42887 - |
Information
Published : 2008-06-04 19:32
Updated : 2024-11-21 00:47
NVD link : CVE-2008-2547
Mitre link : CVE-2008-2547
CVE.ORG link : CVE-2008-2547
JSON object : View
Products Affected
microsoft
- windows_installer
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer