CVE-2008-2434
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
23/12/2008
Last modified:
09/04/2025
Description
The Trend Micro HouseCall ActiveX control 6.51.0.1028 and 6.6.0.1278 in Housecall_ActiveX.dll allows remote attackers to download an arbitrary library file onto a client system via a "custom update server" argument. NOTE: this can be leveraged for code execution by writing to a Startup folder.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:trend_micro:housecall:6.6:*:server:*:*:*:*:* | ||
cpe:2.3:a:trend_micro:housecall:6.6.0.1278:*:*:*:*:*:*:* | ||
cpe:2.3:a:trend_micro:housecall:6.51.0.1028:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1038646&id=EN-1038646
- http://osvdb.org/50941
- http://secunia.com/advisories/31337
- http://secunia.com/secunia_research/2008-32/
- http://securityreason.com/securityalert/4802
- http://www.kb.cert.org/vuls/id/541025
- http://www.securityfocus.com/archive/1/499495/100/0/threaded
- http://www.securityfocus.com/bid/32965
- http://www.vupen.com/english/advisories/2008/3464
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47524
- http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1038646&id=EN-1038646
- http://osvdb.org/50941
- http://secunia.com/advisories/31337
- http://secunia.com/secunia_research/2008-32/
- http://securityreason.com/securityalert/4802
- http://www.kb.cert.org/vuls/id/541025
- http://www.securityfocus.com/archive/1/499495/100/0/threaded
- http://www.securityfocus.com/bid/32965
- http://www.vupen.com/english/advisories/2008/3464
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47524