René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

149 lines
4.7 KiB
JSON

{
"id": "CVE-2007-5660",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-11-02T16:46:00.000",
"lastModified": "2017-07-29T01:33:47.867",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Update Service ActiveX control in isusweb.dll before 6.0.100.65101 in MacroVision FLEXnet Connect and InstallShield 2008 allows remote attackers to execute arbitrary code via an unspecified \"unsafe method,\" possibly involving a buffer overflow."
},
{
"lang": "es",
"value": "Vulnerabilidad sin especificar en el control de ActiveX Update Service en el isusweb.dll anterior al 6.0.100.65101 en el MacroVision FLEXnet Connect y InstallShield 2008 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de \"un m\u00e9todo inseguro\" sin especificar y, posiblemente, involucrando un desbordamiento de b\u00fafer."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:macrovision:flexnet_connect:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBB47236-7B96-4009-822B-C3A1AFCB3434"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:macrovision:installshield_2008:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB1849E-A0FA-478A-B5CA-D515775A3D98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:macrovision:update_service:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A09B825D-2B5C-4BA8-AF5D-AB0C3FB61BA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:macrovision:update_service:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "61E90832-465C-4C77-8171-36593FEF3DB0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:macrovision:update_service:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8427D006-33CA-4677-9536-26596FB210D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:macrovision:update_service:5.1.100_47363:*:*:*:*:*:*:*",
"matchCriteriaId": "C231476E-2C4B-49CF-A322-5BC972CF8107"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:macrovision:update_service:6.0.100_60146:*:*:*:*:*:*:*",
"matchCriteriaId": "06BF3AF2-9326-4856-820B-6788D09F05BF"
}
]
}
]
}
],
"references": [
{
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=618",
"source": "cve@mitre.org"
},
{
"url": "http://support.installshield.com/kb/view.asp?articleid=Q113020",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://support.installshield.com/kb/view.asp?articleid=Q113602",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.macrovision.com/promolanding/7660.htm",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/26280",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.securitytracker.com/id?1018881",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2007/3670",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38210",
"source": "cve@mitre.org"
}
]
}