CVE-2008-0015

8.8 HIGH CISA KEV - Actively Exploited
Published: July 07, 2009 Modified: February 18, 2026
View on NVD

Description

Stack-based buffer overflow in the CComVariant::ReadFromStream function in the Active Template Library (ATL), as used in the MPEG2TuneRequest ActiveX control in msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted web page, as exploited in the wild in July 2009, aka "Microsoft Video ActiveX Control Vulnerability."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://isc.sans.org/diary.html?storyid=6733
Source: cve@mitre.org
Exploit
http://osvdb.org/55651
Source: cve@mitre.org
http://www.iss.net/threats/329.html
Source: cve@mitre.org
Exploit
http://www.kb.cert.org/vuls/id/180513
Source: cve@mitre.org
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA09-187A.html
Source: cve@mitre.org
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA09-195A.html
Source: cve@mitre.org
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA09-223A.html
Source: cve@mitre.org
US Government Resource
http://isc.sans.org/diary.html?storyid=6733
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://osvdb.org/55651
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/36187
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.csis.dk/dk/nyheder/nyheder.asp?tekstID=799
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.iss.net/threats/329.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.kb.cert.org/vuls/id/180513
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.microsoft.com/technet/security/advisory/972890.mspx
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/35558
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/35585
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1022514
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA09-187A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA09-195A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA09-223A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2009/2232
Source: af854a3a-2127-422b-91ae-364da2661108

41 reference(s) from NVD

Quick Stats

CVSS v3 Score
8.8 / 10.0
EPSS (Exploit Probability)
80.6%
99th percentile
Exploitation Status
Actively Exploited
Remediation due: 2026-03-10

Weaknesses (CWE)

Affected Vendors

microsoft