Skip to main content

HP Instant Support ActiveX Control Multiple Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 5 Jun 2008 4708 Views

RISK: Medium Risk

Multiple vulnerabilities have been identified in HP Instant Support, which could be exploited by remote attackers to manipulate data or take complete control of an affected system.

1. Due to buffer overflow errors in the "HPISDataManager.dll" ActiveX control when processing malformed data passed to the "ExtractCab()", "GetFileTime()", "MoveFile()" and "RegistryString()" methods, which could be exploited by remote attackers to crash an affected browser or execute arbitrary code by tricking a user into visiting a specially crafted web page.

2. Due to a design error in the "HPISDataManager.dll" ActiveX control that includes the insecure methods "AppendStringToFile()", "DownloadFile()", "StartApp()" and "DeleteSingleFile()", which could be exploited by malicious web sites to download, execute or delete arbitrary files.


Impact

  • Remote Code Execution

System / Technologies affected

  • HP Instant Support version 1.0.0.22 and prior

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link