The WBEMSingleView.ocx ActiveX control 1.50.1131.0 in Microsoft WMI Administrative Tools 1.1 and earlier allows remote attackers to execute arbitrary code via a crafted argument to the ReleaseContext method, a different vector than CVE-2010-3973, possibly an untrusted pointer dereference.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx | |
http://www.kb.cert.org/vuls/id/725596 | third party advisory us government resource |
http://www.wooyun.org/bug.php?action=view&id=1006 | exploit |
http://twitter.com/carsteneiram/status/17526155733110784 | |
http://secunia.com/advisories/42693 | third party advisory vendor advisory |