Vulnerabilities > CVE-2007-5660 - Remote Code Execution vulnerability in Macrovision InstallShield Update Service Isusweb.DLL

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
macrovision
critical
nessus
exploit available
metasploit

Summary

Unspecified vulnerability in the Update Service ActiveX control in isusweb.dll before 6.0.100.65101 in MacroVision FLEXnet Connect and InstallShield 2008 allows remote attackers to execute arbitrary code via an unspecified "unsafe method," possibly involving a buffer overflow.

Exploit-Db

  • descriptionMacrovision InstallShield Update Service ActiveX Unsafe Method. CVE-2007-5660. Remote exploit for windows platform
    idEDB-ID:16602
    last seen2016-02-02
    modified2010-09-20
    published2010-09-20
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16602/
    titleMacrovision InstallShield Update Service ActiveX Unsafe Method
  • descriptionMacrovision InstallShield Update Service Buffer Overflow. CVE-2007-5660. Remote exploit for windows platform
    idEDB-ID:16573
    last seen2016-02-02
    modified2010-05-09
    published2010-05-09
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16573/
    titleMacrovision InstallShield Update Service Buffer Overflow

Metasploit

Nessus

NASL familyWindows
NASL idFLEXNET_CONNECT_ISUSWEB_ACTIVEX.NASL
descriptionMacrovision FLEXnet Connect, formerly known as InstallShield Update Service, is installed on the remote host. It is a software management solution for internally-developed and third-party applications, and may have been installed as part of the FLEXnet Connect SDK, other InstallShield software, or by running FLEXnet Connect-enabled Windows software. The version of the FLEXnet Connect client on the remote host includes an ActiveX control -- the InstallShield Update Service Agent -- that is marked as
last seen2020-06-01
modified2020-06-02
plugin id27599
published2007-11-01
reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/27599
titleFLEXnet Connect Update Service ActiveX Control Multiple Code Execution Vulnerabilities
code
#
#  (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
  script_id(27599);
  script_version("1.26");
 script_cvs_date("Date: 2019/09/16 11:41:11");

  script_cve_id("CVE-2007-5660", "CVE-2007-6654");
  script_bugtraq_id(26280, 27013);

  script_name(english:"FLEXnet Connect Update Service ActiveX Control Multiple Code Execution Vulnerabilities");
  script_summary(english:"Checks version of Update Service ActiveX control");

 script_set_attribute(attribute:"synopsis", value:
"The remote Windows host has an ActiveX control that allows execution
of arbitrary code." );
 script_set_attribute(attribute:"description", value:
"Macrovision FLEXnet Connect, formerly known as InstallShield Update Service, is installed on the remote host.  It is a
software management solution for internally-developed and third-party applications, and may have been installed as part
of the FLEXnet Connect SDK, other InstallShield software, or by running FLEXnet Connect-enabled Windows software.

The version of the FLEXnet Connect client on the remote host includes an ActiveX control -- the InstallShield Update
Service Agent -- that is marked as 'safe for scripting' and contains several methods that allow for downloading and
launching arbitrary programs.  If a remote attacker can trick a user on the affected host into visiting a specially
crafted web page, this issue could be leveraged to execute arbitrary code on the host subject to the user's privileges.

Additionally, it is reportedly affected by a buffer overflow that can be triggered by passing a long argument for
'ProductCode' to the 'DownloadAndExecute()' method.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number." );
 script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/483062/30/0/threaded" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2007/Dec/552" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to version 6.0.100.65101 or later of the FLEXnet Connect client." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
 script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H");
 script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
 script_set_attribute(attribute:"cvss_score_source", value:"CVE-2007-5660");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"metasploit_name", value:'Macrovision InstallShield Update Service ActiveX Unsafe Method');
 script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
 script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
 script_set_attribute(attribute:"canvas_package", value:'CANVAS');
 script_cwe_id(119);


 script_set_attribute(attribute:"plugin_publication_date", value: "2007/11/01");
 script_set_attribute(attribute:"vuln_publication_date", value: "2007/10/30");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:macrovision:flexnet_connect");
script_set_attribute(attribute:"cpe", value:"cpe:/a:macrovision:installshield_2008");
script_set_attribute(attribute:"cpe", value:"cpe:/a:macrovision:update_service");
script_end_attributes();


  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("smb_hotfixes.nasl");
  script_require_keys("SMB/Registry/Enumerated");
  script_require_ports(139, 445);

  exit(0);
}


include('global_settings.inc');
include('smb_func.inc');
include('smb_activex_func.inc');


if (!get_kb_item('SMB/Registry/Enumerated')) exit(0);


# Locate the file used by the controls.
if (activex_init() != ACX_OK) exit(0);

clsid = '{E9880553-B8A7-4960-A668-95C68BED571E}';
file = activex_get_filename(clsid:clsid);
if (file)
{
  # Check its version.
  ver = activex_get_fileversion(clsid:clsid);
  if (ver && activex_check_fileversion(clsid:clsid, fix:'6.0.100.65101') == TRUE)
  {
    report = NULL;
    if (report_paranoia > 1)
      report =
        'Version ' + ver + ' of the vulnerable control is installed as :\n' +
        '\n' +
        '  ' + file + '\n' +
        '\n' +
        'Note, though, that Nessus did not check whether the kill bit was\n' +
        'set for the control\'s CLSID because of the Report Paranoia setting\n' +
        'in effect when this scan was run.\n';
    else if (activex_get_killbit(clsid:clsid) == 0)
      report =
        'Version ' + ver + ' of the vulnerable control is installed as :\n' +
        '\n' +
        '  ' + file + '\n' +
        '\n' +
        'Moreover, its kill bit is not set so it is accessible via Internet\n' +
        'Explorer.\n';
    if (report) security_hole(port:kb_smb_transport(), extra:report);
  }
}
activex_end();

Packetstorm

Saint

bid26280
descriptionMacroVision InstallShield Update Service isusweb.dll unsafe method
idmisc_installshieldusax
osvdb38347
titleinstallshield_update_isusweb
typeclient

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 26280 CVE(CAN) ID: CVE-2007-5660 MacroVision InstallShield是很多软件厂商都在使用的安装程序解决方案。 Macrovision InstallShield所安装的升级服务(Update Service)可选组件中存在多个不安全的方式,远程攻击者可能利用此漏洞通过诱使用户访问恶意网页控制用户系统。 该组件以以下ActiveX控件的形式实现: CLSID:E9880553-B8A7-4960-A668-95C68BED571E 文件:C:\Windows\Downloaded Files\isusweb.dll 版本:5.01.100.47363和6.0.100.60146 这个控件标记为safe for scripting,如果用户受骗访问了恶意网页的话,控件中的一些方式可能允许下载并启动任意可执行程序。 Macrovision InstallShield 2008 临时解决方法: 通过以下.reg文件为有漏洞的ActiveX控件设置kill-bit: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{E9880553-B8A7-4960-A668-95C68BED571E}] &quot;Compatibility Flags&quot;=dword:00000400 厂商补丁: Macrovision ----------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href="http://saturn.installshield.com/isus/600/update/setup.exe" target="_blank">http://saturn.installshield.com/isus/600/update/setup.exe</a> <a href="http://saturn.installshield.com/isus/600/windowssdk/flexnetconnectsdk.exe" target="_blank">http://saturn.installshield.com/isus/600/windowssdk/flexnetconnectsdk.exe</a>
idSSV:2377
last seen2017-11-19
modified2007-11-02
published2007-11-02
reporterRoot
sourcehttps://www.seebug.org/vuldb/ssvid-2377
titleMacrovision InstallShield升级服务ActiveX控件不安全方式漏洞