|
|||
Rule General Information |
---|
Release Date: | 2019-07-06 | |
Rule Name: | Microsoft Visual Studio PDWizard ocx ActiveX Control Code Execution Vulnerability (CVE-2007-4891) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | A certain ActiveX control in PDWizard.ocx 6.0.0.9782 and earlier in Microsoft Visual Studio 6.0 exposes dangerous (1) StartProcess, (2) SyncShell, (3) SaveAs, (4) CABDefaultURL, (5) CABFileName, and (6) CABRunFile methods, which allows remote attackers to execute arbitrary programs and have other impacts, as demonstrated using absolute pathnames in arguments to StartProcess and SyncShell. | |
Impact: | An attacker could exploit this vulnerability to have unspecified effect. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | SecurityFocusBID:25638 ExploitDB:4393 http://shinnai.altervista.org/exploits/txt/TXT_AZJ5bXwXvMARqwtfe97I.html https://exchange.xforce.ibmcloud.com/vulnerabilities/36572 |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: http://www.microsoft.com/technet/security/ |