Public exploits available
On this page
A remote code execution vulnerability exists in the ActiveX control, tlbinf32.dll. This control can also be found under the name of vstlbinf.dll. Both of these components were never intended to be supported in Internet Explorer. An attacker could exploit the vulnerability by constructing a specially crafted Web page that could potentially allow remote code execution if a user visited the Web page. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged on user.
An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Technical details (analysis)
A remote code execution vulnerability exists in the ActiveX control, tlbinf32.dll. This control can also be found under the name of vstlbinf.dll. The control implemented IObjectsafety incorrectly. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged on user. An attacker could host a specially crafted Web site that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the Web site. This can also include compromised Web sites and Web sites that accept or host user-provided content or advertisements. These Web sites could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger request that takes users to the attacker's Web site. It could also be possible to display specially crafted Web content by using banner advertisements or by using other methods to deliver Web content to affected systems.
Internet Explorer 5.01 and Internet Explorer 6 Service Pack 1
Internet Explorer 6
Internet Explorer 7
All those applications not on the affected list.
Release Date: 2007-08-14T00:00:00
Known false positives
No known false positives at this time.
Prevent COM objects from running in Internet Explorer
Set Internet and Local intranet security zone settings to High to prompt before running ActiveX Controls and Active Scripting in these zones