The Macrovision InstallShield InstallScript One-Click Install (OCI) ActiveX control 12.0 before SP2 does not validate the DLL files that are named as parameters to the control, which allows remote attackers to download arbitrary library code onto a client machine.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://securitytracker.com/id?1019735 | vdb entry not applicable |
http://knowledge.macrovision.com/selfservice/microsites/search.do?cmd=displayKC&externalId=Q113640 | patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41558 | vdb entry third party advisory |
http://www.securityfocus.com/bid/28533 | vdb entry patch |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=649 | third party advisory not applicable |
http://secunia.com/advisories/29549 | patch third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2008/1049 | vdb entry not applicable |