First published: Thu Jul 26 2007(Updated: )
The CallCode ActiveX control in caller.dll 3.0 before 20070713, and 3.0 SP1 before 3.0.5.81, in CA (formerly Computer Associates) eTrust Intrusion Detection allows remote attackers to load arbitrary DLLs on a client system, and execute code from these DLLs, via unspecified "scriptable functions."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ca Etrust Intrusion Detection | =3.05.81 | |
Ca Etrust Intrusion Detection | =3.0-sp1 | |
Broadcom Etrust Intrusion Detection | =3.0 |
http://supportconnectw.ca.com/public/etrust/etrust_intrusion/infodocs/eid-callervilnsecnot.asp
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.