2024-07-14 02:06:08 +00:00

146 lines
4.2 KiB
JSON

{
"id": "CVE-2007-0328",
"sourceIdentifier": "cret@cert.org",
"published": "2007-06-01T00:30:00.000",
"lastModified": "2017-07-29T01:30:07.733",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The DWUpdateService ActiveX control in the agent (agent.exe) in Macrovision FLEXnet Connect 6.0 and Update Service 3.x to 5.x allows remote attackers to execute arbitrary commands via (1) the Execute method, and obtain the exit status using (2) the GetExitCode method."
},
{
"lang": "es",
"value": "El control ActiveX DWUpdateService en el agente (agent.exe) en Macrovision FLEXnet Connect versi\u00f3n 6.0 y Update Service versiones 3.x hasta 5.x, permite a atacantes remotos ejecutar comandos arbitrarios por medio de (1) el m\u00e9todo Execute y obtener el estado de salida usando (2) el m\u00e9todo GetExitCode."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:macrovision:flexnet_connect:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2B07D756-3DB4-4ECD-83FD-CB60830F9267"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:macrovision:update_service:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A09B825D-2B5C-4BA8-AF5D-AB0C3FB61BA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:macrovision:update_service:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "61E90832-465C-4C77-8171-36593FEF3DB0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:macrovision:update_service:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8427D006-33CA-4677-9536-26596FB210D9"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/36896",
"source": "cret@cert.org"
},
{
"url": "http://secunia.com/advisories/25501",
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/32842",
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://support.installshield.com/kb/view.asp?articleid=Q113020",
"source": "cret@cert.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.blackberry.com/btsc/articles/749/KB16469_f.SAL_Public.html",
"source": "cret@cert.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/524681",
"source": "cret@cert.org",
"tags": [
"Patch",
"US Government Resource"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/2017",
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/3278",
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34660",
"source": "cret@cert.org"
}
]
}