CVE-2007-6506
HP Software Update Client 3.0.8.4 - Multiple Vulnerabilities
Severity Score
9.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The HPRulesEngine.ContentCollection.1 ActiveX Control in RulesEngine.dll for HP Software Update 4.000.005.007 and earlier, including 3.0.8.4, allows remote attackers to (1) overwrite and corrupt arbitrary files via arguments to the SaveToFile method, and possibly (2) access arbitrary files via the LoadDataFromFile method.
El control ActiveX HPRulesEngine.ContentCollection.1 en la biblioteca RulesEngine.dll para HP Software Update versión 4.000.005.007 y anteriores, incluyendo versión 3.0.8.4, permite a los atacantes remotos (1) sobrescribir y corromper archivos arbitrarios por medio de argumentos en el método SaveToFile y, posiblemente , (2) acceder a archivos arbitrarios por medio del método LoadDataFromFile.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-12-20 CVE Reserved
- 2007-12-20 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- 2024-10-23 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://blogs.zdnet.com/security/?p=768 | X_refsource_misc | |
http://computerworld.com/action/article.do?command=viewArticleBasic&articleId=9053818 | X_refsource_misc | |
http://it.slashdot.org/it/07/12/20/2327242.shtml | X_refsource_misc | |
http://www.anspi.pl/~porkythepig/hp-issue/wyfukanyszynszyl.txt | X_refsource_misc | |
http://www.securitytracker.com/id?1019133 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/39153 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/4757 | 2024-08-07 | |
http://www.securityfocus.com/bid/26950 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/28177 | 2018-10-15 | |
http://www.securityfocus.com/archive/1/485451/100/0/threaded | 2018-10-15 | |
http://www.securityfocus.com/archive/1/485734/100/0/threaded | 2018-10-15 | |
http://www.vupen.com/english/advisories/2007/4271 | 2018-10-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Hp Search vendor "Hp" | Software Update Search vendor "Hp" for product "Software Update" | <= 4.000.005.007 Search vendor "Hp" for product "Software Update" and version " <= 4.000.005.007" | - |
Affected
| ||||||
Hp Search vendor "Hp" | Software Update Search vendor "Hp" for product "Software Update" | 3.0.8.4 Search vendor "Hp" for product "Software Update" and version "3.0.8.4" | - |
Affected
|