Vulnerabilities > CVE-2007-5660 - Unspecified vulnerability in Macrovision Flexnet Connect, Installshield 2008 and Update Service
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Unspecified vulnerability in the Update Service ActiveX control in isusweb.dll before 6.0.100.65101 in MacroVision FLEXnet Connect and InstallShield 2008 allows remote attackers to execute arbitrary code via an unspecified "unsafe method," possibly involving a buffer overflow.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 7 |
Exploit-Db
description Macrovision InstallShield Update Service ActiveX Unsafe Method. CVE-2007-5660. Remote exploit for windows platform id EDB-ID:16602 last seen 2016-02-02 modified 2010-09-20 published 2010-09-20 reporter metasploit source https://www.exploit-db.com/download/16602/ title Macrovision InstallShield Update Service ActiveX Unsafe Method description Macrovision InstallShield Update Service Buffer Overflow. CVE-2007-5660. Remote exploit for windows platform id EDB-ID:16573 last seen 2016-02-02 modified 2010-05-09 published 2010-05-09 reporter metasploit source https://www.exploit-db.com/download/16573/ title Macrovision InstallShield Update Service Buffer Overflow
Metasploit
description This module exploits a stack buffer overflow in Macrovision InstallShield Update Service(Isusweb.dll 6.0.100.54472). By passing an overly long ProductCode string to the DownloadAndExecute method, an attacker may be able to execute arbitrary code. id MSF:EXPLOIT/WINDOWS/BROWSER/MACROVISION_DOWNLOADANDEXECUTE last seen 2020-06-12 modified 2017-07-24 published 2007-12-26 references https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5660 reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/browser/macrovision_downloadandexecute.rb title Macrovision InstallShield Update Service Buffer Overflow description This module allows attackers to execute code via an unsafe method in Macrovision InstallShield 2008. id MSF:EXPLOIT/WINDOWS/BROWSER/MACROVISION_UNSAFE last seen 2020-05-21 modified 2017-09-09 published 2008-10-01 references https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5660 reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/browser/macrovision_unsafe.rb title Macrovision InstallShield Update Service ActiveX Unsafe Method
Nessus
NASL family | Windows |
NASL id | FLEXNET_CONNECT_ISUSWEB_ACTIVEX.NASL |
description | Macrovision FLEXnet Connect, formerly known as InstallShield Update Service, is installed on the remote host. It is a software management solution for internally-developed and third-party applications, and may have been installed as part of the FLEXnet Connect SDK, other InstallShield software, or by running FLEXnet Connect-enabled Windows software. The version of the FLEXnet Connect client on the remote host includes an ActiveX control -- the InstallShield Update Service Agent -- that is marked as |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 27599 |
published | 2007-11-01 |
reporter | This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/27599 |
title | FLEXnet Connect Update Service ActiveX Control Multiple Code Execution Vulnerabilities |
code |
|
Packetstorm
data source https://packetstormsecurity.com/files/download/83165/macrovision_downloadandexecute.rb.txt id PACKETSTORM:83165 last seen 2016-12-05 published 2009-11-26 reporter MC source https://packetstormsecurity.com/files/83165/Macrovision-InstallShield-Update-Service-Buffer-Overflow.html title Macrovision InstallShield Update Service Buffer Overflow data source https://packetstormsecurity.com/files/download/83187/macrovision_unsafe.rb.txt id PACKETSTORM:83187 last seen 2016-12-05 published 2009-11-26 reporter MC source https://packetstormsecurity.com/files/83187/Macrovision-InstallShield-Update-Service-ActiveX-Unsafe-Method.html title Macrovision InstallShield Update Service ActiveX Unsafe Method
Saint
bid | 26280 |
description | MacroVision InstallShield Update Service isusweb.dll unsafe method |
id | misc_installshieldusax |
osvdb | 38347 |
title | installshield_update_isusweb |
type | client |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 26280 CVE(CAN) ID: CVE-2007-5660 MacroVision InstallShield是很多软件厂商都在使用的安装程序解决方案。 Macrovision InstallShield所安装的升级服务(Update Service)可选组件中存在多个不安全的方式,远程攻击者可能利用此漏洞通过诱使用户访问恶意网页控制用户系统。 该组件以以下ActiveX控件的形式实现: CLSID:E9880553-B8A7-4960-A668-95C68BED571E 文件:C:\Windows\Downloaded Files\isusweb.dll 版本:5.01.100.47363和6.0.100.60146 这个控件标记为safe for scripting,如果用户受骗访问了恶意网页的话,控件中的一些方式可能允许下载并启动任意可执行程序。 Macrovision InstallShield 2008 临时解决方法: 通过以下.reg文件为有漏洞的ActiveX控件设置kill-bit: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{E9880553-B8A7-4960-A668-95C68BED571E}] "Compatibility Flags"=dword:00000400 厂商补丁: Macrovision ----------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href="http://saturn.installshield.com/isus/600/update/setup.exe" target="_blank">http://saturn.installshield.com/isus/600/update/setup.exe</a> <a href="http://saturn.installshield.com/isus/600/windowssdk/flexnetconnectsdk.exe" target="_blank">http://saturn.installshield.com/isus/600/windowssdk/flexnetconnectsdk.exe</a> |
id | SSV:2377 |
last seen | 2017-11-19 |
modified | 2007-11-02 |
published | 2007-11-02 |
reporter | Root |
source | https://www.seebug.org/vuldb/ssvid-2377 |
title | Macrovision InstallShield升级服务ActiveX控件不安全方式漏洞 |
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=618
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=618
- http://osvdb.org/38347
- http://osvdb.org/38347
- http://secunia.com/advisories/27475
- http://secunia.com/advisories/27475
- http://support.installshield.com/kb/view.asp?articleid=Q113020
- http://support.installshield.com/kb/view.asp?articleid=Q113020
- http://support.installshield.com/kb/view.asp?articleid=Q113602
- http://support.installshield.com/kb/view.asp?articleid=Q113602
- http://www.macrovision.com/promolanding/7660.htm
- http://www.macrovision.com/promolanding/7660.htm
- http://www.securityfocus.com/bid/26280
- http://www.securityfocus.com/bid/26280
- http://www.securitytracker.com/id?1018881
- http://www.securitytracker.com/id?1018881
- http://www.vupen.com/english/advisories/2007/3670
- http://www.vupen.com/english/advisories/2007/3670
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38210
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38210