Vulnerabilities > CVE-2007-6506 - File Overwrite vulnerability in HP Software Update 'RulesEngine.dll' ActiveX Control
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
The HPRulesEngine.ContentCollection.1 ActiveX Control in RulesEngine.dll for HP Software Update 4.000.005.007 and earlier, including 3.0.8.4, allows remote attackers to (1) overwrite and corrupt arbitrary files via arguments to the SaveToFile method, and possibly (2) access arbitrary files via the LoadDataFromFile method.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 7 |
Exploit-Db
description | HP Software Update client 3.0.8.4 Multiple Remote Vulnerabilities. CVE-2007-6506. Dos exploit for windows platform |
file | exploits/windows/dos/4757.txt |
id | EDB-ID:4757 |
last seen | 2016-01-31 |
modified | 2007-12-19 |
platform | windows |
port | |
published | 2007-12-19 |
reporter | porkythepig |
source | https://www.exploit-db.com/download/4757/ |
title | hp software update client 3.0.8.4 - Multiple Vulnerabilities |
type | dos |
Nessus
NASL family | Windows |
NASL id | HP_UPDATE_RULESENGINE_ACTIVEX_INSECURE.NASL |
description | The remote host contains the HP Software Update software, installed by default on many HP notebooks to support automatic software updates and vulnerability patching. The version of this software on the remote host includes an ActiveX control, |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 29747 |
published | 2007-12-23 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/29747 |
title | HP Software Update HPRulesEngine.ContentCollection ActiveX (RulesEngine.dll) Multiple Insecure Methods |
References
- http://blogs.zdnet.com/security/?p=768
- http://computerworld.com/action/article.do?command=viewArticleBasic&articleId=9053818
- http://it.slashdot.org/it/07/12/20/2327242.shtml
- http://secunia.com/advisories/28177
- http://www.anspi.pl/~porkythepig/hp-issue/wyfukanyszynszyl.txt
- http://www.securityfocus.com/archive/1/485451/100/0/threaded
- http://www.securityfocus.com/archive/1/485734/100/0/threaded
- http://www.securityfocus.com/bid/26950
- http://www.securitytracker.com/id?1019133
- http://www.vupen.com/english/advisories/2007/4271
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39153
- https://www.exploit-db.com/exploits/4757