RULE(RULE ID:322502)

Rule General Information
Release Date: 2019-07-06
Rule Name: Microsoft Visual Studio PDWizard ocx ActiveX Control Code Execution Vulnerability (CVE-2007-4891)
Severity:
CVE ID:
Rule Protection Details
Description: A certain ActiveX control in PDWizard.ocx 6.0.0.9782 and earlier in Microsoft Visual Studio 6.0 exposes dangerous (1) StartProcess, (2) SyncShell, (3) SaveAs, (4) CABDefaultURL, (5) CABFileName, and (6) CABRunFile methods, which allows remote attackers to execute arbitrary programs and have other impacts, as demonstrated using absolute pathnames in arguments to StartProcess and SyncShell.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others
Reference: SecurityFocusBID:25638
ExploitDB:4393
http://shinnai.altervista.org/exploits/txt/TXT_AZJ5bXwXvMARqwtfe97I.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/36572
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
http://www.microsoft.com/technet/security/