![microsoft visio viewer 2002 vulnerability microsoft visio viewer 2002 vulnerability](http://www.activewin.com/reviews/software/apps/ms/visio2k2/Images/savedforwebsmall.jpg)
- Microsoft visio viewer 2002 vulnerability install#
- Microsoft visio viewer 2002 vulnerability verification#
Microsoft Windows XP (x86) SP3 is installed.OR Microsoft Outlook Express 6 on Windows XP SP3 x86.AND the version of Msoe.dll is less than.AND Microsoft Outlook Express 6.0 for Windows XP/2003 is installed.Microsoft Windows XP (x86) SP2 is installed.OR Microsoft Outlook Express 6 on Windows XP SP2 x86.AND Microsoft Outlook Express 6 SP1 is installed.OR Microsoft Outlook Express 6 SP1 on Windows 2000 SP4.AND Microsoft Outlook Express 5.5 SP2 is installed.Microsoft Windows 2000 SP4 or later is installed.Microsoft Outlook Express 5.5 SP2 on Windows 2000 SP4.Microsoft Outlook Express Windows Media Player Windows ATL Component DHTML Editing Component ActiveX Control Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008
![microsoft visio viewer 2002 vulnerability microsoft visio viewer 2002 vulnerability](http://www.visguy.com/wp-content/uploads/2009/05/visio-viewer-in-outlook-2.png)
NET 2003 SP1, Visual Studio 2005 SP Gold and SP1, and Visual C++ 2005 SP Gold and SP1 and Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 does not properly restrict use of OleLoadFromStream in instantiating objects from data streams, which allows remote attackers to execute arbitrary code via a crafted HTML document with an ATL (1) component or (2) control, related to ATL headers and bypassing security policies, aka "ATL COM Initialization Vulnerability." The Active Template Library (ATL) in Microsoft Visual Studio. Permissions, Privileges, and Access Controlsįailure to Control Generation of Code ('Code Injection')ĭefinition Id: oval::def:6245
Microsoft visio viewer 2002 vulnerability install#
Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. This security update is specifically intended for developers of components and controls. This is an informational change only.Summary: This security update addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. Removed the registry key information in favor of product codes.
Microsoft visio viewer 2002 vulnerability verification#
Revision Note: V3.1 (July 27, 2011): Corrected the update verification information for Microsoft Visual C++ 2005 Service Pack 1 Redistributable Package, Microsoft Visual C++ 2008 Redistributable Package, and Microsoft Visual C++ 2008 Service Pack 1 Redistributable Package.