Macrovision FLEXnet DWUpdateService ActiveX (agent.exe) Multiple Method Arbitrary Command Execution

critical Nessus Plugin ID 25371

Synopsis

The remote Windows host has an ActiveX control that allows execution of arbitrary commands.

Description

Macrovision FLEXnet Connect, formerly known as InstallShield Update Service, is installed on the remote host. It is a software management solution for internally-developed and third-party applications, and may have been installed as part of the FLEXnet Connect SDK, other InstallShield software, or by running FLEXnet Connect-enabled Windows software.

The version of FLEXnet Connect on the remote host includes an ActiveX control -- DWUpdateService -- that reportedly allows a remote, unauthenticated attacker to execute arbitrary commands. If an attacker can trick a user on the affected host into visiting a specially crafted web page, this issue could be leveraged to execute arbitrary code on the host subject to the user's privileges.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Either upgrade to a version of the FLEXnet Connect SDK with installer version 12.0.0.49974 or later; or, disable the control as described in the US-CERT advisory referenced above.

Plugin Details

Severity: Critical

ID: 25371

File Name: flexnet_connect_dwupdateservice_activex_cmd_exec.nasl

Version: 1.19

Type: local

Agent: windows

Family: Windows

Published: 6/2/2007

Updated: 9/16/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2007-0328

CVSS v3

Risk Factor: Critical

Base Score: 9.6

Temporal Score: 8.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:macrovision:flexnet_connect, cpe:/a:macrovision:update_service

Required KB Items: SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 5/31/2007

Reference Information

CVE: CVE-2007-0328

CERT: 524681