Multiple buffer overflows in the (1) ActiveListen (Xlisten.dll) and (2) ActiveVoice (Xvoice.dll) speech controls, as used by Microsoft Internet Explorer 5.01, 6, and 7, allow remote attackers to execute arbitrary code via a crafted ActiveX object that triggers memory corruption, as demonstrated via the ModeName parameter to the FindEngine function in ACTIVEVOICEPROJECTLib.DirectSS.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2031
https://exchange.xforce.ibmcloud.com/vulnerabilities/34630
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033
http://www.vupen.com/english/advisories/2007/2153
http://www.us-cert.gov/cas/techalerts/TA07-163A.html
http://www.securityfocus.com/bid/24426
http://www.securityfocus.com/archive/1/471947/100/0/threaded
http://www.kb.cert.org/vuls/id/507433
http://www.exploit-db.com/exploits/4065
http://securitytracker.com/id?1018235
http://secunia.com/advisories/25627
http://retrogod.altervista.org/win_speech_xp_sp2.html