TITLE: Microsoft Visual Studio User Control Load Event Code Execution Vulnerability SECUNIA ADVISORY ID: SA18409 VERIFY ADVISORY: http://secunia.com/advisories/18409/ CRITICAL: Less critical IMPACT: System access WHERE: >From remote SOFTWARE: Microsoft Visual Studio 2005 http://secunia.com/product/6779/ DESCRIPTION: priestmaster has discovered a vulnerability in Microsoft Visual Studio, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a design error that allows program code within the "Load" event of a user-defined control to be automatically executed when a project containing a form that uses the malicious control is opened. This can be exploited to execute arbitrary program code. Successful exploitation requires that the user is e.g. tricked into opening a Solution file in a malicious Visual Studio project. The vulnerability has been confirmed in Microsoft Visual C# 2005 Express Edition. Other versions may also be affected. SOLUTION: Do not open Visual Studio project files from untrusted sources. PROVIDED AND/OR DISCOVERED BY: priestmaster ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------