First published: Thu Jul 26 2007(Updated: )
The CallCode ActiveX control in caller.dll 3.0 before 20070713, and 3.0 SP1 before 3.0.5.81, in CA (formerly Computer Associates) eTrust Intrusion Detection allows remote attackers to load arbitrary DLLs on a client system, and execute code from these DLLs, via unspecified "scriptable functions."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom eTrust Intrusion Detection | =3.0 | |
Broadcom eTrust Intrusion Detection | =3.0-sp1 | |
Broadcom eTrust Intrusion Detection | =3.05.81 |
http://supportconnectw.ca.com/public/etrust/etrust_intrusion/infodocs/eid-callervilnsecnot.asp
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3302 is considered high severity due to its ability to allow remote code execution.
Fix CVE-2007-3302 by upgrading to the patched version of CA eTrust Intrusion Detection 3.0 SP1 3.0.5.81 or later.
With CVE-2007-3302, attackers can potentially load and execute arbitrary DLLs on the client system.
CVE-2007-3302 affects CA eTrust Intrusion Detection versions prior to 3.0.5.81 and 3.0 before 20070713.
Yes, CVE-2007-3302 can be exploited remotely via unpatched ActiveX control vulnerabilities.