The (1) SetDebugging and (2) RunEgatherer methods in IBM Access Support eGatherer ActiveX control 2.0.0.16 allow remote attackers to create files with arbitrary content, as demonstrated by creating a .hta file in a Startup folder.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/16428 | vdb entry |
http://www.eeye.com/html/research/advisories/AD20040615B.html | exploit patch vendor advisory |
http://marc.info/?l=bugtraq&m=108746693619324&w=2 | mailing list |
http://secunia.com/advisories/11072 | third party advisory |
http://marc.info/?l=full-disclosure&m=108741557604568&w=2 | mailing list |
http://www.osvdb.org/7090 | vdb entry |
http://research.eeye.com/html/advisories/published/AD20040615B.html | third party advisory |
http://www.securityfocus.com/bid/10562 | vdb entry |