- Description
- The Trend Micro HouseCall ActiveX control 6.51.0.1028 and 6.6.0.1278 in Housecall_ActiveX.dll allows remote attackers to download an arbitrary library file onto a client system via a "custom update server" argument. NOTE: this can be leveraged for code execution by writing to a Startup folder.
- Source
- PSIRT-CNA@flexerasoftware.com
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
- nvd@nist.gov
- CWE-94
- Hype score
- Not currently trending
- Comment
- -
- Impact
- -
- Solution
- -
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:trend_micro:housecall:6.6:*:server:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "503EBD0A-F452-41A8-9E3A-A8F08F860511"
},
{
"criteria": "cpe:2.3:a:trend_micro:housecall:6.6.0.1278:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2B17DAA4-964E-462E-AAE1-9092FCF7572E"
},
{
"criteria": "cpe:2.3:a:trend_micro:housecall:6.51.0.1028:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9DEEC569-540D-4E83-A3CE-468C38C02099"
}
],
"operator": "OR"
}
]
}
]