ID

VAR-200708-0004


CVE

CVE-2007-2928


TITLE

IBM and Lenovo Access Support acpRunner ActiveX control fails to restrict access to methods

Trust: 0.8

sources: CERT/CC: VU#426737

DESCRIPTION

Format string vulnerability in the IBM Lenovo Access Support acpRunner ActiveX control, as distributed in acpcontroller.dll before 1.2.8.0 and possibly acpir.dll before 1.0.0.9 (Automated Solutions 1.0 before fix pack 1), allows remote attackers to execute arbitrary code via format string specifiers in unknown data. Lenovo Inline Automated Solutions ActiveX controls are prone to multiple vulnerabilities. An attacker may exploit these issues by enticing victims into opening a maliciously crafted HTML document. Failed exploit attempts may result in denial-of-service conditions. These issues affects versions prior to 'acpcontroller.dll' ActiveX control 1.2.8.0 and 'acpir.dll' ActiveX control 1.0.0.9. Automated Solutions is a software package of ActiveX tools installed on Lenovo and IBM computers. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA07-226A Microsoft Updates for Multiple Vulnerabilities Original release date: August 14, 2007 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Internet Explorer * Microsoft Windows Media Player * Microsoft Office * Microsoft Office for Mac * Microsoft XML Core Services * Microsoft Visual Basic * Microsoft Virtual PC * Microsoft Virtual Server Overview Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Internet Explorer, Windows Media Player, Office, Office for Mac, XML Core Services, Visual Basic, Virtual PC, and Virtual Server. I. Description Microsoft has released updates to address vulnerabilities that affect Microsoft Windows, Internet Explorer, Windows Media Player, Office, Office for Mac, XML Core Services, Visual Basic,Virtual PC, and Virtual Server as part of the Microsoft Security Bulletin Summary for August 2007. Further information about the vulnerabilities addressed by these updates is available in the Vulnerability Notes Database II. An attacker may also be able to cause a denial of service. III. Solution Apply updates from Microsoft Microsoft has provided updates for these vulnerabilities in the August 2007 Security Bulletins. The Security Bulletins describe any known issues related to the updates. Administrators are encouraged to note any known issues that are described in the Bulletins and test for any potentially adverse effects. Updates for Microsoft Windows and Microsoft Office XP and later are available on the Microsoft Update site. Microsoft Office 2000 updates are available on the Microsoft Office Update site. Apple Mac OS X users should obtain updates from the Mactopia web site. System administrators may wish to consider using an automated patch distribution system such as Windows Server Update Services (WSUS). IV. References * US-CERT Vulnerability Notes for Microsoft August 2007 updates - <http://www.kb.cert.org/vuls/byid?searchview&query=ms07-aug> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/> * Microsoft Security Bulletin Summary for August 2007 - <http://www.microsoft.com/technet/security/bulletin/ms07-aug.mspx> * Microsoft Update - <https://update.microsoft.com/microsoftupdate/> * Microsoft Office Update - <http://officeupdate.microsoft.com/> * Windows Server Update Services - <http://www.microsoft.com/windowsserversystem/updateservices/default.mspx> * Mactopia - <http://www.microsoft.com/mac/> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/alerts/TA07-226A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA07-226A Feedback VU#361968" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2007 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History August 14, 2007: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRsIPdvRFkHkM87XOAQI0pAgAqwe7XJni4X4VcqfNQIZU1XiXDE04/3W+ Tl4jOtH9nxmwmQtUSMrTjrmtxB97DbA9sd6F5kYwwHB3MnPEY4lVe/zifmjQRH1o lvMYH/Zd6KnGU3FFX/w4gZ1x1A/QTpIvXLXTKdFd/vyQxTHqEvZxttpH7BHpt92O MQem58NVIKLxpZ2a1KAh2kdkDRT8sP8vO8G6gKyY1PVHwHSJJW9JKeVzxzGV9kuL +wCZOGGcq6DWxUt71XDK8MEvVoMpwwwxIHazG33a2ybepC3Bg4heILEj6urUaF2N wlkFIzGGfzwVTzDi88VP9ZXHcffJfMOLUA5jeh84rAElYciQIysGvg== =glfP -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. 2) The acpRunner (AcpController.dll) ActiveX control does not properly verify the signature of downloaded packages. 3) The acpRunner (AcpController.dll) ActiveX control does not restrict potentially dangerous operations to certain domains. tricking a user into visiting a malicious website. SOLUTION: Apply Automated Solutions Fix Pack 1: http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649 PROVIDED AND/OR DISCOVERED BY: Will Dormann, CERT/CC. ORIGINAL ADVISORY: IBM / Lenovo: http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649 US-CERT VU#426737: http://www.kb.cert.org/vuls/id/426737 US-CERT VU#599657: http://www.kb.cert.org/vuls/id/599657 US-CERT VU#570705: http://www.kb.cert.org/vuls/id/570705 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 4.32

sources: NVD: CVE-2007-2928 // CERT/CC: VU#426737 // CERT/CC: VU#599657 // CERT/CC: VU#570705 // JVNDB: JVNDB-2007-000630 // BID: 25311 // VULHUB: VHN-26290 // PACKETSTORM: 58571 // PACKETSTORM: 58598

AFFECTED PRODUCTS

vendor:ibmmodel: - scope: - version: -

Trust: 2.4

vendor:lenovomodel: - scope: - version: -

Trust: 2.4

vendor:lenovomodel:automated solutionsscope:eqversion:1.0

Trust: 2.4

vendor:lenovomodel:access supportscope: - version: -

Trust: 1.4

vendor:lenovomodel:access supportscope:eqversion:*

Trust: 1.0

vendor:lenovomodel:inline automated solutionsscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:inline automated solutions fix packscope:neversion:1

Trust: 0.3

sources: CERT/CC: VU#426737 // CERT/CC: VU#599657 // CERT/CC: VU#570705 // BID: 25311 // JVNDB: JVNDB-2007-000630 // CNNVD: CNNVD-200708-255 // NVD: CVE-2007-2928

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-2928
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#426737
value: 2.89

Trust: 0.8

CARNEGIE MELLON: VU#599657
value: 1.20

Trust: 0.8

CARNEGIE MELLON: VU#570705
value: 2.13

Trust: 0.8

NVD: CVE-2007-2928
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200708-255
value: MEDIUM

Trust: 0.6

VULHUB: VHN-26290
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-2928
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-26290
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#426737 // CERT/CC: VU#599657 // CERT/CC: VU#570705 // VULHUB: VHN-26290 // JVNDB: JVNDB-2007-000630 // CNNVD: CNNVD-200708-255 // NVD: CVE-2007-2928

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-2928

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 58571 // CNNVD: CNNVD-200708-255

TYPE

format string

Trust: 0.6

sources: CNNVD: CNNVD-200708-255

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000630

PATCH

title:Automated Solutions fix pack 1 (ibm.com)url:http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649

Trust: 0.8

sources: JVNDB: JVNDB-2007-000630

EXTERNAL IDS

db:SECUNIAid:26482

Trust: 5.1

db:CERT/CCid:VU#599657

Trust: 3.7

db:NVDid:CVE-2007-2928

Trust: 2.8

db:BIDid:25311

Trust: 2.8

db:VUPENid:ADV-2007-2882

Trust: 1.7

db:XFid:36033

Trust: 1.4

db:CERT/CCid:VU#426737

Trust: 1.2

db:CERT/CCid:VU#570705

Trust: 1.2

db:USCERTid:TA07-226A

Trust: 0.9

db:USCERTid:SA07-226A

Trust: 0.8

db:JVNDBid:JVNDB-2007-000630

Trust: 0.8

db:MSid:MS07-045

Trust: 0.6

db:CNNVDid:CNNVD-200708-255

Trust: 0.6

db:VULHUBid:VHN-26290

Trust: 0.1

db:PACKETSTORMid:58571

Trust: 0.1

db:PACKETSTORMid:58598

Trust: 0.1

sources: CERT/CC: VU#426737 // CERT/CC: VU#599657 // CERT/CC: VU#570705 // VULHUB: VHN-26290 // BID: 25311 // JVNDB: JVNDB-2007-000630 // PACKETSTORM: 58571 // PACKETSTORM: 58598 // CNNVD: CNNVD-200708-255 // NVD: CVE-2007-2928

REFERENCES

url:http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=migr-67649

Trust: 4.4

url:http://secunia.com/advisories/26482

Trust: 4.1

url:http://www.microsoft.com/technet/security/bulletin/ms07-045.mspx

Trust: 3.3

url:http://www.kb.cert.org/vuls/id/599657

Trust: 2.9

url:http://support.microsoft.com/kb/240797

Trust: 2.7

url:http://www.securityfocus.com/bid/25311

Trust: 2.5

url:http://www.frsirt.com/english/advisories/2007/2882

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/36033

Trust: 1.4

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/2882

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/36033

Trust: 1.1

url:http://secunia.com/advisories/26482/

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2928

Trust: 0.8

url:http://www.jpcert.or.jp/at/2007/at070018.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta07-226a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta07-226a/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2928

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa07-226a.html

Trust: 0.8

url:http://www.us-cert.gov/cas/techalerts/ta07-226a.html

Trust: 0.8

url:http://www.kb.cert.org/vuls/id/426737

Trust: 0.4

url:http://www.kb.cert.org/vuls/id/570705

Trust: 0.4

url:http://www.lenovo.com/ca/en/

Trust: 0.3

url:http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&amp;lndocid=migr-67649

Trust: 0.1

url:http://www.us-cert.gov/cas/alerts/ta07-226a.html>

Trust: 0.1

url:https://update.microsoft.com/microsoftupdate/>

Trust: 0.1

url:http://officeupdate.microsoft.com/>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://www.microsoft.com/windowsserversystem/updateservices/default.mspx>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=ms07-aug>

Trust: 0.1

url:http://www.us-cert.gov/reading_room/securing_browser/>

Trust: 0.1

url:http://www.microsoft.com/mac/>

Trust: 0.1

url:http://www.microsoft.com/technet/security/bulletin/ms07-aug.mspx>

Trust: 0.1

url:http://secunia.com/product/3584/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#426737 // CERT/CC: VU#599657 // CERT/CC: VU#570705 // VULHUB: VHN-26290 // BID: 25311 // JVNDB: JVNDB-2007-000630 // PACKETSTORM: 58571 // PACKETSTORM: 58598 // CNNVD: CNNVD-200708-255 // NVD: CVE-2007-2928

CREDITS

Karl Lynn

Trust: 0.6

sources: CNNVD: CNNVD-200708-255

SOURCES

db:CERT/CCid:VU#426737
db:CERT/CCid:VU#599657
db:CERT/CCid:VU#570705
db:VULHUBid:VHN-26290
db:BIDid:25311
db:JVNDBid:JVNDB-2007-000630
db:PACKETSTORMid:58571
db:PACKETSTORMid:58598
db:CNNVDid:CNNVD-200708-255
db:NVDid:CVE-2007-2928

LAST UPDATE DATE

2025-04-10T22:57:16.420000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#426737date:2007-08-23T00:00:00
db:CERT/CCid:VU#599657date:2009-04-13T00:00:00
db:CERT/CCid:VU#570705date:2007-08-23T00:00:00
db:VULHUBid:VHN-26290date:2018-10-12T00:00:00
db:BIDid:25311date:2016-07-06T14:39:00
db:JVNDBid:JVNDB-2007-000630date:2007-08-31T00:00:00
db:CNNVDid:CNNVD-200708-255date:2007-08-16T00:00:00
db:NVDid:CVE-2007-2928date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#426737date:2007-08-14T00:00:00
db:CERT/CCid:VU#599657date:2007-08-14T00:00:00
db:CERT/CCid:VU#570705date:2007-08-14T00:00:00
db:VULHUBid:VHN-26290date:2007-08-15T00:00:00
db:BIDid:25311date:2007-08-14T00:00:00
db:JVNDBid:JVNDB-2007-000630date:2007-08-31T00:00:00
db:PACKETSTORMid:58571date:2007-08-15T03:53:51
db:PACKETSTORMid:58598date:2007-08-15T19:37:35
db:CNNVDid:CNNVD-200708-255date:2007-08-15T00:00:00
db:NVDid:CVE-2007-2928date:2007-08-15T19:17:00