ID

VAR-200708-0222


CVE

CVE-2007-2240


TITLE

IBM and Lenovo Access Support acpRunner ActiveX control fails to restrict access to methods

Trust: 0.8

sources: CERT/CC: VU#426737

DESCRIPTION

The IBM Lenovo Access Support acpRunner ActiveX control, as distributed in acpcontroller.dll before 1.2.8.0 and possibly acpir.dll before 1.0.0.9 (Automated Solutions 1.0 before fix pack 1), does not properly validate digital signatures of downloaded software, which makes it easier for remote attackers to spoof a download. Lenovo Inline Automated Solutions ActiveX controls are prone to multiple vulnerabilities. An attacker may exploit these issues by enticing victims into opening a maliciously crafted HTML document. Failed exploit attempts may result in denial-of-service conditions. These issues affects versions prior to 'acpcontroller.dll' ActiveX control 1.2.8.0 and 'acpir.dll' ActiveX control 1.0.0.9. Automated Solutions is a software package of ActiveX tools installed on Lenovo and IBM computers. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA07-226A Microsoft Updates for Multiple Vulnerabilities Original release date: August 14, 2007 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Internet Explorer * Microsoft Windows Media Player * Microsoft Office * Microsoft Office for Mac * Microsoft XML Core Services * Microsoft Visual Basic * Microsoft Virtual PC * Microsoft Virtual Server Overview Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Internet Explorer, Windows Media Player, Office, Office for Mac, XML Core Services, Visual Basic, Virtual PC, and Virtual Server. I. Description Microsoft has released updates to address vulnerabilities that affect Microsoft Windows, Internet Explorer, Windows Media Player, Office, Office for Mac, XML Core Services, Visual Basic,Virtual PC, and Virtual Server as part of the Microsoft Security Bulletin Summary for August 2007. Further information about the vulnerabilities addressed by these updates is available in the Vulnerability Notes Database II. An attacker may also be able to cause a denial of service. III. Solution Apply updates from Microsoft Microsoft has provided updates for these vulnerabilities in the August 2007 Security Bulletins. The Security Bulletins describe any known issues related to the updates. Administrators are encouraged to note any known issues that are described in the Bulletins and test for any potentially adverse effects. Updates for Microsoft Windows and Microsoft Office XP and later are available on the Microsoft Update site. Microsoft Office 2000 updates are available on the Microsoft Office Update site. Apple Mac OS X users should obtain updates from the Mactopia web site. System administrators may wish to consider using an automated patch distribution system such as Windows Server Update Services (WSUS). IV. References * US-CERT Vulnerability Notes for Microsoft August 2007 updates - <http://www.kb.cert.org/vuls/byid?searchview&query=ms07-aug> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/> * Microsoft Security Bulletin Summary for August 2007 - <http://www.microsoft.com/technet/security/bulletin/ms07-aug.mspx> * Microsoft Update - <https://update.microsoft.com/microsoftupdate/> * Microsoft Office Update - <http://officeupdate.microsoft.com/> * Windows Server Update Services - <http://www.microsoft.com/windowsserversystem/updateservices/default.mspx> * Mactopia - <http://www.microsoft.com/mac/> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/alerts/TA07-226A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA07-226A Feedback VU#361968" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2007 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History August 14, 2007: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRsIPdvRFkHkM87XOAQI0pAgAqwe7XJni4X4VcqfNQIZU1XiXDE04/3W+ Tl4jOtH9nxmwmQtUSMrTjrmtxB97DbA9sd6F5kYwwHB3MnPEY4lVe/zifmjQRH1o lvMYH/Zd6KnGU3FFX/w4gZ1x1A/QTpIvXLXTKdFd/vyQxTHqEvZxttpH7BHpt92O MQem58NVIKLxpZ2a1KAh2kdkDRT8sP8vO8G6gKyY1PVHwHSJJW9JKeVzxzGV9kuL +wCZOGGcq6DWxUt71XDK8MEvVoMpwwwxIHazG33a2ybepC3Bg4heILEj6urUaF2N wlkFIzGGfzwVTzDi88VP9ZXHcffJfMOLUA5jeh84rAElYciQIysGvg== =glfP -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. 3) The acpRunner (AcpController.dll) ActiveX control does not restrict potentially dangerous operations to certain domains. tricking a user into visiting a malicious website. SOLUTION: Apply Automated Solutions Fix Pack 1: http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649 PROVIDED AND/OR DISCOVERED BY: Will Dormann, CERT/CC. ORIGINAL ADVISORY: IBM / Lenovo: http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649 US-CERT VU#426737: http://www.kb.cert.org/vuls/id/426737 US-CERT VU#599657: http://www.kb.cert.org/vuls/id/599657 US-CERT VU#570705: http://www.kb.cert.org/vuls/id/570705 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 4.32

sources: NVD: CVE-2007-2240 // CERT/CC: VU#426737 // CERT/CC: VU#599657 // CERT/CC: VU#570705 // JVNDB: JVNDB-2007-000629 // BID: 25311 // VULHUB: VHN-25602 // PACKETSTORM: 58571 // PACKETSTORM: 58598

AFFECTED PRODUCTS

vendor:ibmmodel: - scope: - version: -

Trust: 2.4

vendor:lenovomodel: - scope: - version: -

Trust: 2.4

vendor:lenovomodel:automated solutionsscope:eqversion:1.0

Trust: 2.4

vendor:lenovomodel:access supportscope: - version: -

Trust: 1.4

vendor:lenovomodel:access supportscope:eqversion:*

Trust: 1.0

vendor:lenovomodel:inline automated solutionsscope:eqversion:0

Trust: 0.3

vendor:lenovomodel:inline automated solutions fix packscope:neversion:1

Trust: 0.3

sources: CERT/CC: VU#426737 // CERT/CC: VU#599657 // CERT/CC: VU#570705 // BID: 25311 // JVNDB: JVNDB-2007-000629 // CNNVD: CNNVD-200708-240 // NVD: CVE-2007-2240

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-2240
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#426737
value: 2.89

Trust: 0.8

CARNEGIE MELLON: VU#599657
value: 1.20

Trust: 0.8

CARNEGIE MELLON: VU#570705
value: 2.13

Trust: 0.8

NVD: CVE-2007-2240
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200708-240
value: MEDIUM

Trust: 0.6

VULHUB: VHN-25602
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-2240
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-25602
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#426737 // CERT/CC: VU#599657 // CERT/CC: VU#570705 // VULHUB: VHN-25602 // JVNDB: JVNDB-2007-000629 // CNNVD: CNNVD-200708-240 // NVD: CVE-2007-2240

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-2240

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 58571 // CNNVD: CNNVD-200708-240

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-200708-240

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000629

PATCH

title:Automated Solutions fix pack 1 (ibm.com)url:http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649

Trust: 0.8

sources: JVNDB: JVNDB-2007-000629

EXTERNAL IDS

db:SECUNIAid:26482

Trust: 5.1

db:CERT/CCid:VU#570705

Trust: 3.7

db:BIDid:25311

Trust: 2.8

db:NVDid:CVE-2007-2240

Trust: 2.8

db:VUPENid:ADV-2007-2882

Trust: 1.7

db:OSVDBid:39555

Trust: 1.7

db:CERT/CCid:VU#426737

Trust: 1.2

db:CERT/CCid:VU#599657

Trust: 1.2

db:USCERTid:TA07-226A

Trust: 0.9

db:USCERTid:SA07-226A

Trust: 0.8

db:JVNDBid:JVNDB-2007-000629

Trust: 0.8

db:MSid:MS07-045

Trust: 0.6

db:XFid:36028

Trust: 0.6

db:CNNVDid:CNNVD-200708-240

Trust: 0.6

db:VULHUBid:VHN-25602

Trust: 0.1

db:PACKETSTORMid:58571

Trust: 0.1

db:PACKETSTORMid:58598

Trust: 0.1

sources: CERT/CC: VU#426737 // CERT/CC: VU#599657 // CERT/CC: VU#570705 // VULHUB: VHN-25602 // BID: 25311 // JVNDB: JVNDB-2007-000629 // PACKETSTORM: 58571 // PACKETSTORM: 58598 // CNNVD: CNNVD-200708-240 // NVD: CVE-2007-2240

REFERENCES

url:http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=migr-67649

Trust: 4.4

url:http://secunia.com/advisories/26482

Trust: 4.1

url:http://www.microsoft.com/technet/security/bulletin/ms07-045.mspx

Trust: 3.3

url:http://www.kb.cert.org/vuls/id/570705

Trust: 2.9

url:http://support.microsoft.com/kb/240797

Trust: 2.7

url:http://www.securityfocus.com/bid/25311

Trust: 2.5

url:http://osvdb.org/39555

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2007/2882

Trust: 1.4

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/2882

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/36028

Trust: 1.1

url:http://secunia.com/advisories/26482/

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2240

Trust: 0.8

url:http://www.jpcert.or.jp/at/2007/at070018.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta07-226a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta07-226a/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2240

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa07-226a.html

Trust: 0.8

url:http://www.us-cert.gov/cas/techalerts/ta07-226a.html

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/36028

Trust: 0.6

url:http://www.kb.cert.org/vuls/id/426737

Trust: 0.4

url:http://www.kb.cert.org/vuls/id/599657

Trust: 0.4

url:http://www.lenovo.com/ca/en/

Trust: 0.3

url:http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&amp;lndocid=migr-67649

Trust: 0.1

url:http://www.us-cert.gov/cas/alerts/ta07-226a.html>

Trust: 0.1

url:https://update.microsoft.com/microsoftupdate/>

Trust: 0.1

url:http://officeupdate.microsoft.com/>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://www.microsoft.com/windowsserversystem/updateservices/default.mspx>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=ms07-aug>

Trust: 0.1

url:http://www.us-cert.gov/reading_room/securing_browser/>

Trust: 0.1

url:http://www.microsoft.com/mac/>

Trust: 0.1

url:http://www.microsoft.com/technet/security/bulletin/ms07-aug.mspx>

Trust: 0.1

url:http://secunia.com/product/3584/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#426737 // CERT/CC: VU#599657 // CERT/CC: VU#570705 // VULHUB: VHN-25602 // BID: 25311 // JVNDB: JVNDB-2007-000629 // PACKETSTORM: 58571 // PACKETSTORM: 58598 // CNNVD: CNNVD-200708-240 // NVD: CVE-2007-2240

CREDITS

Karl Lynn

Trust: 0.6

sources: CNNVD: CNNVD-200708-240

SOURCES

db:CERT/CCid:VU#426737
db:CERT/CCid:VU#599657
db:CERT/CCid:VU#570705
db:VULHUBid:VHN-25602
db:BIDid:25311
db:JVNDBid:JVNDB-2007-000629
db:PACKETSTORMid:58571
db:PACKETSTORMid:58598
db:CNNVDid:CNNVD-200708-240
db:NVDid:CVE-2007-2240

LAST UPDATE DATE

2025-04-10T22:57:16.479000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#426737date:2007-08-23T00:00:00
db:CERT/CCid:VU#599657date:2009-04-13T00:00:00
db:CERT/CCid:VU#570705date:2007-08-23T00:00:00
db:VULHUBid:VHN-25602date:2018-10-12T00:00:00
db:BIDid:25311date:2016-07-06T14:39:00
db:JVNDBid:JVNDB-2007-000629date:2007-08-31T00:00:00
db:CNNVDid:CNNVD-200708-240date:2007-08-16T00:00:00
db:NVDid:CVE-2007-2240date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#426737date:2007-08-14T00:00:00
db:CERT/CCid:VU#599657date:2007-08-14T00:00:00
db:CERT/CCid:VU#570705date:2007-08-14T00:00:00
db:VULHUBid:VHN-25602date:2007-08-15T00:00:00
db:BIDid:25311date:2007-08-14T00:00:00
db:JVNDBid:JVNDB-2007-000629date:2007-08-31T00:00:00
db:PACKETSTORMid:58571date:2007-08-15T03:53:51
db:PACKETSTORMid:58598date:2007-08-15T19:37:35
db:CNNVDid:CNNVD-200708-240date:2007-08-15T00:00:00
db:NVDid:CVE-2007-2240date:2007-08-15T19:17:00