2024-07-14 02:06:08 +00:00

108 lines
3.4 KiB
JSON

{
"id": "CVE-2007-4891",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-09-14T01:17:00.000",
"lastModified": "2017-09-29T01:29:24.703",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A certain ActiveX control in PDWizard.ocx 6.0.0.9782 and earlier in Microsoft Visual Studio 6.0 exposes dangerous (1) StartProcess, (2) SyncShell, (3) SaveAs, (4) CABDefaultURL, (5) CABFileName, and (6) CABRunFile methods, which allows remote attackers to execute arbitrary programs and have other impacts, as demonstrated using absolute pathnames in arguments to StartProcess and SyncShell."
},
{
"lang": "es",
"value": "Un determinado control ActiveX de PDWizard.ocx 6.0.0.9782 y versiones anteriores de Microsoft Visual Studio 6.0 expone m\u00e9todos peligrosos (1) StartProcess, (2) SyncShell, (3) SaveAs, (4) CABDefaultURL, (5) CABFileName, y (6) CABRunFile, lo cual permite a atacantes remotos ejecutar programas de su elecci\u00f3n y tener otros impactos, como se demuestra utilizando nombre de ruta absoluta en argumentos a StartProcess y SyncShell."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D5CDA0E2-DFBD-4EE0-80DC-76AA55ADFEFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio:6.0.0.9782:*:*:*:*:*:*:*",
"matchCriteriaId": "C1DF3FDC-7E70-4385-9DAF-539FAAE77C5B"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/37106",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/26779",
"source": "cve@mitre.org"
},
{
"url": "http://shinnai.altervista.org/exploits/txt/TXT_AZJ5bXwXvMARqwtfe97I.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/25638",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36572",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/4393",
"source": "cve@mitre.org"
}
]
}