cve-2007-5661
Vulnerability from cvelistv5
Published
2008-04-04 00:00
Modified
2024-08-07 15:39
Severity ?
Summary
The Macrovision InstallShield InstallScript One-Click Install (OCI) ActiveX control 12.0 before SP2 does not validate the DLL files that are named as parameters to the control, which allows remote attackers to download arbitrary library code onto a client machine.
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:39:13.547Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1019735",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1019735"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://knowledge.macrovision.com/selfservice/microsites/search.do?cmd=displayKC\u0026externalId=Q113640"
          },
          {
            "name": "installshield-oneclick-code-execution(41558)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41558"
          },
          {
            "name": "28533",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28533"
          },
          {
            "name": "20080331 Macrovision InstallShield InstallScript One-Click Install Untrusted Library Loading Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=649"
          },
          {
            "name": "29549",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29549"
          },
          {
            "name": "ADV-2008-1049",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1049"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Macrovision InstallShield InstallScript One-Click Install (OCI) ActiveX control 12.0 before SP2 does not validate the DLL files that are named as parameters to the control, which allows remote attackers to download arbitrary library code onto a client machine."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1019735",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1019735"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://knowledge.macrovision.com/selfservice/microsites/search.do?cmd=displayKC\u0026externalId=Q113640"
        },
        {
          "name": "installshield-oneclick-code-execution(41558)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41558"
        },
        {
          "name": "28533",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28533"
        },
        {
          "name": "20080331 Macrovision InstallShield InstallScript One-Click Install Untrusted Library Loading Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=649"
        },
        {
          "name": "29549",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29549"
        },
        {
          "name": "ADV-2008-1049",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1049"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-5661",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Macrovision InstallShield InstallScript One-Click Install (OCI) ActiveX control 12.0 before SP2 does not validate the DLL files that are named as parameters to the control, which allows remote attackers to download arbitrary library code onto a client machine."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1019735",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1019735"
            },
            {
              "name": "http://knowledge.macrovision.com/selfservice/microsites/search.do?cmd=displayKC\u0026externalId=Q113640",
              "refsource": "CONFIRM",
              "url": "http://knowledge.macrovision.com/selfservice/microsites/search.do?cmd=displayKC\u0026externalId=Q113640"
            },
            {
              "name": "installshield-oneclick-code-execution(41558)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41558"
            },
            {
              "name": "28533",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28533"
            },
            {
              "name": "20080331 Macrovision InstallShield InstallScript One-Click Install Untrusted Library Loading Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=649"
            },
            {
              "name": "29549",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29549"
            },
            {
              "name": "ADV-2008-1049",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1049"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-5661",
    "datePublished": "2008-04-04T00:00:00",
    "dateReserved": "2007-10-23T00:00:00",
    "dateUpdated": "2024-08-07T15:39:13.547Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2007-5661\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-04-04T00:44:00.000\",\"lastModified\":\"2025-08-01T02:04:24.627\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Macrovision InstallShield InstallScript One-Click Install (OCI) ActiveX control 12.0 before SP2 does not validate the DLL files that are named as parameters to the control, which allows remote attackers to download arbitrary library code onto a client machine.\"},{\"lang\":\"es\",\"value\":\"El control ActiveX Macrovision InstallShield InstallScript One-Click Install (OCI) 12.0 versiones anteriores SP2 no valida los ficheros DLL que se consideran como par\u00e1metros del control, lo cual permite a atacantes remotos descargar c\u00f3digo de librer\u00edas de su elecci\u00f3n de la m\u00e1quina cliente.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:revenera:installshield:*:-:*:*:premier:*:*:*\",\"versionEndExcluding\":\"12\",\"matchCriteriaId\":\"3E517998-10B4-4F97-86CE-0B80BD585988\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:revenera:installshield:*:-:*:*:professional:*:*:*\",\"versionEndExcluding\":\"12\",\"matchCriteriaId\":\"6E210100-72C1-4934-84EE-D015EEFDC6B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:revenera:installshield:12:-:*:*:premier:*:*:*\",\"matchCriteriaId\":\"BC0E32A3-182F-45A5-88E7-B56E89949372\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:revenera:installshield:12:-:*:*:professional:*:*:*\",\"matchCriteriaId\":\"1A35FFED-FDF9-40E9-B02C-29BB2E87D0C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:revenera:installshield:12:sp1:*:*:premier:*:*:*\",\"matchCriteriaId\":\"817F98C8-E328-4234-82C9-C6AE2AD82753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:revenera:installshield:12:sp1:*:*:professional:*:*:*\",\"matchCriteriaId\":\"3560B05C-CD70-4796-8788-DD4CA5A552CF\"}]}]}],\"references\":[{\"url\":\"http://knowledge.macrovision.com/selfservice/microsites/search.do?cmd=displayKC\u0026externalId=Q113640\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=649\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/29549\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1019735\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://www.securityfocus.com/bid/28533\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/1049\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/41558\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://knowledge.macrovision.com/selfservice/microsites/search.do?cmd=displayKC\u0026externalId=Q113640\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=649\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/29549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1019735\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://www.securityfocus.com/bid/28533\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/1049\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/41558\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.