ID CVE-2007-5660
Summary Unspecified vulnerability in the Update Service ActiveX control in isusweb.dll before 6.0.100.65101 in MacroVision FLEXnet Connect and InstallShield 2008 allows remote attackers to execute arbitrary code via an unspecified "unsafe method," possibly involving a buffer overflow.
References
Vulnerable Configurations
  • cpe:2.3:a:macrovision:flexnet_connect
    cpe:2.3:a:macrovision:flexnet_connect
  • cpe:2.3:a:macrovision:installshield_2008
    cpe:2.3:a:macrovision:installshield_2008
  • cpe:2.3:a:macrovision:update_service:3.0
    cpe:2.3:a:macrovision:update_service:3.0
  • cpe:2.3:a:macrovision:update_service:4.0
    cpe:2.3:a:macrovision:update_service:4.0
  • cpe:2.3:a:macrovision:update_service:5.0
    cpe:2.3:a:macrovision:update_service:5.0
  • cpe:2.3:a:macrovision:update_service:5.1.100_47363
    cpe:2.3:a:macrovision:update_service:5.1.100_47363
  • cpe:2.3:a:macrovision:update_service:6.0.100_60146
    cpe:2.3:a:macrovision:update_service:6.0.100_60146
CVSS
Base: 9.3 (as of 05-11-2007 - 09:16)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
exploit-db via4
  • description Macrovision InstallShield Update Service ActiveX Unsafe Method. CVE-2007-5660. Remote exploit for windows platform
    id EDB-ID:16602
    last seen 2016-02-02
    modified 2010-09-20
    published 2010-09-20
    reporter metasploit
    source https://www.exploit-db.com/download/16602/
    title Macrovision InstallShield Update Service ActiveX Unsafe Method
  • description Macrovision InstallShield Update Service Buffer Overflow. CVE-2007-5660. Remote exploit for windows platform
    id EDB-ID:16573
    last seen 2016-02-02
    modified 2010-05-09
    published 2010-05-09
    reporter metasploit
    source https://www.exploit-db.com/download/16573/
    title Macrovision InstallShield Update Service Buffer Overflow
metasploit via4
nessus via4
NASL family Windows
NASL id FLEXNET_CONNECT_ISUSWEB_ACTIVEX.NASL
description Macrovision FLEXnet Connect, formerly known as InstallShield Update Service, is installed on the remote host. It is a software management solution for internally-developed and third-party applications, and may have been installed as part of the FLEXnet Connect SDK, other InstallShield software, or by running FLEXnet Connect-enabled Windows software. The version of the FLEXnet Connect client on the remote host includes an ActiveX control -- the InstallShield Update Service Agent -- that is marked as 'safe for scripting' and contains several methods that allow for downloading and launching arbitrary programs. If a remote attacker can trick a user on the affected host into visiting a specially crafted web page, this issue could be leveraged to execute arbitrary code on the host subject to the user's privileges. Additionally, it is reportedly affected by a buffer overflow that can be triggered by passing a long argument for 'ProductCode' to the 'DownloadAndExecute()' method.
last seen 2019-02-21
modified 2018-11-15
plugin id 27599
published 2007-11-01
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=27599
title FLEXnet Connect Update Service ActiveX Control Multiple Code Execution Vulnerabilities
packetstorm via4
refmap via4
bid 26280
confirm
idefense 20071031 Macrovision InstallShield Update Service ActiveX Unsafe Method Vulnerability
osvdb 38347
sectrack 1018881
secunia 27475
vupen ADV-2007-3670
xf macrovision-isusweb-code-execution(38210)
saint via4
bid 26280
description MacroVision InstallShield Update Service isusweb.dll unsafe method
id misc_installshieldusax
osvdb 38347
title installshield_update_isusweb
type client
Last major update 07-03-2011 - 22:01
Published 02-11-2007 - 12:46
Last modified 28-07-2017 - 21:33
Back to Top