First published: Sat Dec 15 2007(Updated: )
Multiple stack-based buffer overflows in the awApi4.AnswerWorks.1 ActiveX control in awApi4.dll 4.0.0.42, as used by Vantage Linguistics AnswerWorks, and Intuit Clearly Bookkeeping, ProSeries, QuickBooks, Quicken, QuickTax, and TurboTax, allow remote attackers to execute arbitrary code via long arguments to the (1) GetHistory, (2) GetSeedQuery, (3) SetSeedQuery, and possibly other methods. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Intuit QuickBooks | ||
Intuit ProSeries | ||
QuickBooks | ||
Quicken | ||
Intuit QuickBooks | ||
Intuit TurboTax | ||
ActiveX | =4.0.0.42 | |
Vantage Linguistics AnswerWorks |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6387 is considered a high-severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2007-6387, ensure that all affected software, including Intuit products, is updated to the latest security patches.
CVE-2007-6387 affects various Intuit software products like QuickBooks, ProSeries, Quicken, TurboTax, and the Vantage Linguistics AnswerWorks ActiveX control.
Yes, CVE-2007-6387 can be exploited remotely by attackers through specially crafted input.
Exploiting CVE-2007-6387 can lead to the execution of arbitrary code on the target system, potentially allowing attackers to gain control of the affected software.