Macrovision InstallShield InstallScript One-Click Install ActiveX Arbitrary Code Execution

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an ActiveX control that is affected by a
buffer overflow vulnerability.

Description :

The remote host contains the InstallScript One-Click Install ActiveX
control distributed with Macrovision's InstallShield.

The installed version of that control reportedly allows an attacker to
download arbitrary DLL files from a website to be executed as part of
a web install. If a remote attacker can trick a user on the affected
host into visiting a specially crafted web page, this issue could be
leveraged to execute arbitrary code on the affected host subject to
the user's privileges.

See also :

http://www.nessus.org/u?a6772e50
http://seclists.org/fulldisclosure/2008/Mar/599

Solution :

Upgrade to InstallShield 12 Service Pack 2 if necessary, apply the
appropriate hotfix, and then rebuild and update any HTML files as
described in the vendor's advisory.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 31724 (installshield_installscript_library_loading.nasl)

Bugtraq ID: 28533

CVE ID: CVE-2007-5661

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now