First published: Fri Sep 14 2007(Updated: )
A certain ActiveX control in PDWizard.ocx 6.0.0.9782 and earlier in Microsoft Visual Studio 6.0 exposes dangerous (1) StartProcess, (2) SyncShell, (3) SaveAs, (4) CABDefaultURL, (5) CABFileName, and (6) CABRunFile methods, which allows remote attackers to execute arbitrary programs and have other impacts, as demonstrated using absolute pathnames in arguments to StartProcess and SyncShell.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Visual Studio | =6.0 | |
Microsoft Visual Studio | =6.0.0.9782 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4891 is rated as critical due to its ability to allow remote attackers to execute arbitrary programs on the affected system.
To mitigate CVE-2007-4891, users should upgrade to a patched version of Microsoft Visual Studio that addresses this vulnerability.
CVE-2007-4891 affects Microsoft Visual Studio versions 6.0 and 6.0.0.9782.
Exploitation of CVE-2007-4891 could lead to unauthorized program execution and potential compromise of sensitive data.
Although CVE-2007-4891 was disclosed in 2007, systems running the affected versions of Visual Studio remain vulnerable if they have not been updated.