Vulnerabilities > CVE-2007-0328 - Unspecified vulnerability in Macrovision Flexnet Connect and Update Service
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN macrovision
nessus
Summary
The DWUpdateService ActiveX control in the agent (agent.exe) in Macrovision FLEXnet Connect 6.0 and Update Service 3.x to 5.x allows remote attackers to execute arbitrary commands via (1) the Execute method, and obtain the exit status using (2) the GetExitCode method.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Nessus
NASL family | Windows |
NASL id | FLEXNET_CONNECT_DWUPDATESERVICE_ACTIVEX_CMD_EXEC.NASL |
description | Macrovision FLEXnet Connect, formerly known as InstallShield Update Service, is installed on the remote host. It is a software management solution for internally-developed and third-party applications, and may have been installed as part of the FLEXnet Connect SDK, other InstallShield software, or by running FLEXnet Connect-enabled Windows software. The version of FLEXnet Connect on the remote host includes an ActiveX control -- DWUpdateService -- that reportedly allows a remote, unauthenticated attacker to execute arbitrary commands. If an attacker can trick a user on the affected host into visiting a specially crafted web page, this issue could be leveraged to execute arbitrary code on the host subject to the user |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25371 |
published | 2007-06-02 |
reporter | This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/25371 |
title | Macrovision FLEXnet DWUpdateService ActiveX (agent.exe) Multiple Method Arbitrary Command Execution |
code |
|
References
- http://osvdb.org/36896
- http://osvdb.org/36896
- http://secunia.com/advisories/25501
- http://secunia.com/advisories/25501
- http://secunia.com/advisories/32842
- http://secunia.com/advisories/32842
- http://support.installshield.com/kb/view.asp?articleid=Q113020
- http://support.installshield.com/kb/view.asp?articleid=Q113020
- http://www.blackberry.com/btsc/articles/749/KB16469_f.SAL_Public.html
- http://www.blackberry.com/btsc/articles/749/KB16469_f.SAL_Public.html
- http://www.kb.cert.org/vuls/id/524681
- http://www.kb.cert.org/vuls/id/524681
- http://www.vupen.com/english/advisories/2007/2017
- http://www.vupen.com/english/advisories/2007/2017
- http://www.vupen.com/english/advisories/2008/3278
- http://www.vupen.com/english/advisories/2008/3278
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34660
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34660