First published: Sat Oct 13 2007(Updated: )
Buffer overflow in a certain ActiveX control in ScanObjectBrowser.DLL in G DATA Antivirus 2007 might allow remote attackers to execute arbitrary code via unspecified parameters to the SelectPath function. NOTE: this issue might not cross privilege boundaries in most environments, since it is not marked as safe for scripting.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
gdata Antivirus | =2007 | |
G Data Antivirus | =2007 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5436 is classified as a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2007-5436, update G DATA Antivirus 2007 to the latest version that addresses this buffer overflow vulnerability.
CVE-2007-5436 affects G DATA Antivirus 2007, specifically the ActiveX control within ScanObjectBrowser.DLL.
CVE-2007-5436 can allow remote attackers to execute arbitrary code on the affected system.
Yes, CVE-2007-5436 primarily impacts Windows environments due to its association with the G DATA Antivirus software.