Summary
This host is installed with CA PSFormX or WebScan ActiveX controls and is prone to multiple remote code execution vulnerabilities.
Impact
Successful exploitation will let the remote attackers execute arbitrary code and can compromise a vulnerable system.
Impact Level: System
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
A workaround is to set the killbit for the following CLSIDs, {56393399-041A-4650-94C7-13DFCB1F4665}, {7B297BFD-85E4-4092-B2AF-16A91B2EA103}
Insight
Multiple unspecified errors in the CA PSFormX and WebScan ActiveX controls, allow remote attackers to execute arbitrary code via unknown vectors.
Affected
PSFormX ActiveX control with CLSID
{56393399-041A-4650-94C7-13DFCB1F4665} WebScan ActiveX control with CLSID {7B297BFD-85E4-4092-B2AF-16A91B2EA103}
References
Severity
Classification
-
CVE CVE-2010-2193 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft .NET Framework 'RC4' Information Disclosure Vulnerability (2960358)
- MS Internet Explorer 'VBScript' Remote Code Execution Vulnerability
- MS Windows Insecure Library Loading Remote Code Execution Vulnerabilities (2269637)
- Microsoft Office Excel 2003 Invalid Object Type Remote Code Execution Vulnerability
- Microsoft PowerPoint 2007 OfficeArt Atom Remote Code Execution Vulnerability