Executive Summary

Informations
Name CVE-2007-4790 First vendor Publication 2007-09-10
Vendor Cve Last vendor Modification 2021-07-23

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Stack-based buffer overflow in certain ActiveX controls in (1) FPOLE.OCX 6.0.8450.0 and (2) Foxtlib.ocx, as used in the Microsoft Visual FoxPro 6.0 fpole 1.0 Type Library; and Internet Explorer 5.01, 6 SP1 and SP2, and 7; allows remote attackers to execute arbitrary code via a long first argument to the FoxDoCmd function.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4790

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:5481
 
Oval ID: oval:org.mitre.oval:def:5481
Title: ActiveX Object Memory Corruption Vulnerability
Description: Stack-based buffer overflow in certain ActiveX controls in (1) FPOLE.OCX 6.0.8450.0 and (2) Foxtlib.ocx, as used in the Microsoft Visual FoxPro 6.0 fpole 1.0 Type Library; and Internet Explorer 5.01, 6 SP1 and SP2, and 7; allows remote attackers to execute arbitrary code via a long first argument to the FoxDoCmd function.
Family: windows Class: vulnerability
Reference(s): CVE-2007-4790
Version: 11
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Product(s): Microsoft Internet Explorer
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 4
Application 1

OpenVAS Exploits

Date Description
2011-01-13 Name : Microsoft Internet Explorer HTML Rendering Remote Memory Corruption Vulnerabi...
File : nvt/gb_ms08-010.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
41468 Microsoft FoxPro ActiveX Web Page Parsing Unspecified Memory Corruption

Snort® IPS/IDS

Date Description
2016-03-14 Microsoft Visual FoxPro ActiveX clsid access
RuleID : 36792 - Revision : 2 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer HTML+TIME animatemotion property memory corruptio...
RuleID : 16382 - Revision : 11 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer isindex buffer overflow attempt
RuleID : 16063 - Revision : 12 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer DXLUTBuilder ActiveX function call unicode access
RuleID : 13456 - Revision : 13 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer DXLUTBuilder ActiveX function call access
RuleID : 13455 - Revision : 15 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer DXLUTBuilder ActiveX clsid unicode access
RuleID : 13454 - Revision : 13 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer DXLUTBuilder ActiveX clsid access
RuleID : 13453 - Revision : 12 - Type : BROWSER-IE
2014-01-10 Microsoft Visual FoxPro foxtlib ActiveX clsid unicode access
RuleID : 13452 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Windows Visual FoxPro foxtlib ActiveX clsid access
RuleID : 13451 - Revision : 10 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Visual FoxPro ActiveX function call unicode access
RuleID : 12420 - Revision : 7 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Visual FoxPro ActiveX function call access
RuleID : 12419 - Revision : 11 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Visual FoxPro ActiveX clsid unicode access
RuleID : 12418 - Revision : 7 - Type : WEB-ACTIVEX
2014-01-10 Microsoft Visual FoxPro ActiveX clsid access
RuleID : 12417 - Revision : 15 - Type : BROWSER-PLUGINS

Nessus® Vulnerability Scanner

Date Description
2008-02-12 Name : Arbitrary code can be executed on the remote host through the web client.
File : smb_nt_ms08-010.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/25571
CERT http://www.us-cert.gov/cas/techalerts/TA08-043C.html
EXPLOIT-DB https://www.exploit-db.com/exploits/4369
HP http://marc.info/?l=bugtraq&m=120361015026386&w=2
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08...
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
SECTRACK http://www.securitytracker.com/id?1019378
VUPEN http://www.vupen.com/english/advisories/2008/0512/references
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/36496

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Date Informations
2021-07-27 00:24:34
  • Multiple Updates
2021-07-24 01:44:11
  • Multiple Updates
2021-07-24 01:04:10
  • Multiple Updates
2021-07-23 21:25:01
  • Multiple Updates
2021-07-23 17:24:38
  • Multiple Updates
2021-05-04 12:06:23
  • Multiple Updates
2021-04-22 01:06:56
  • Multiple Updates
2020-05-23 00:20:26
  • Multiple Updates
2018-10-13 00:22:37
  • Multiple Updates
2017-09-29 09:23:12
  • Multiple Updates
2017-07-29 12:02:31
  • Multiple Updates
2016-04-26 16:34:49
  • Multiple Updates
2014-02-17 10:41:43
  • Multiple Updates
2014-01-19 21:24:26
  • Multiple Updates
2013-05-11 10:36:07
  • Multiple Updates