ID CVE-2006-5658
Summary BlooMooWeb ActiveX control (AidemATL.dll) allows remote attackers to (1) download arbitrary files via a URL in the bstrUrl parameter to the BW_DownloadFile method, (2) execute arbitrary local files via a file path in the bstrParams parameter to the BW_LaunchGame method, and (3) delete arbitrary files via a file path in the filePath parameter to the BW_DeleteTempFile method.
References
Vulnerable Configurations
  • cpe:2.3:a:studio_achtundachtzig:bloomooweb_activex_control:1.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:studio_achtundachtzig:bloomooweb_activex_control:1.0.9:*:*:*:*:*:*:*
CVSS
Base: 7.6 (as of 17-10-2018 - 21:44)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:H/Au:N/C:C/I:C/A:C
refmap via4
bid 20827
bugtraq 20061031 ActiveX security leaks in the TV owned web game platform
secunia 22666
sreason 1808
vupen ADV-2006-4294
xf
  • bloomooweb-activex-command-execution(29968)
  • bloomooweb-bwdeletetempfile-dos(29997)
Last major update 17-10-2018 - 21:44
Published 03-11-2006 - 00:07
Last modified 17-10-2018 - 21:44
Back to Top