CVE-2011-0658

Severity

93%

Complexity

86%

Confidentiality

165%

Integer underflow in the OLE Automation protocol implementation in VBScript.dll in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted WMF file, aka "OLE Automation Underflow Vulnerability."

Integer underflow in the OLE Automation protocol implementation in VBScript.dll in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted WMF file, aka "OLE Automation Underflow Vulnerability."

CVSS 2.0 Base Score 9.3. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C).

Overview

First reported 13 years ago

2011-06-16 20:55:00

Last updated 5 years ago

2019-02-26 14:04:00

Affected Software

Microsoft Windows 2003 Server Service Pack 2

Microsoft Windows 7 64-bit Service Pack 1 (initial release)

Microsoft Windows 7 x86 Service Pack 1

Microsoft Windows Server 2003 Service Pack 2

Microsoft Windows Server 2008 Itanium

Windows Server 2008 for 32-bit Systems

Microsoft Windows Server 2008 x64 (64-bit) (intial release)

Windows Server 2008 Service Pack 2 for 32-bit systems

Microsoft Windows Server 2008 Service Pack 2 x64 (64-bit)

Microsoft Windows Server 2008 Service Pack 2 for Itanium-Based Systems

Windows Server 2008 R2 for Itanium-based Systems

r2

Windows Server 2008 R2 for 32-bit Systems

r2

Microsoft Windows Server 2008 r2 Service Pack 1 Itanium

r2

Microsoft Windows Server 2008 R2 Service Pack 1 x64 (64-bit)

r2

Microsoft Windows Vista Service Pack 1 (initial release)

Microsoft Windows Vista Service Pack 1 x64 (64-bit)

Microsoft Windows Vista Service Pack 2

Microsoft Windows Vista Service Pack 2 x64 (64-bit)

Microsoft Windows XP

Microsoft Windows XP Service Pack 2 x64 (64-bit)

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.