{"vuid":"VU#34453","idnumber":"34453","name":"SystemWizard Launch ActiveX Control lacks authentication","keywords":["SystemSoft","ActiveX Control","HP Pavilion","SystemWizard","Launch","launch.ocx"],"overview":"","clean_desc":"The SystemWizard \"Launch\" ActiveX Control may allow attackers to execute arbitrary commands on systems where the control is installed. This control was shipped on HP Pavilion computers running Windows 98, as part of a diagnostic application named \"SystemWizard\" produced by SystemSoft. This control can be used to run arbitrary commands without authentication. Because the control is marked safe-for-scripting, this vulnerability can be exploited via a web page if the user has the vulnerable control installed. This control is implemented in the file launch.ocx and has a ClassID of {63F62A67-1E02-11D1-A710-0000860F8A73}. The control can also be referenced as LAUNCH.LaunchCtrl.1.","impact":"Attacker can execute arbitrary commands.","resolution":"Apply a patch SystemSoft has a patch which appears to address this issue: http://www.systemsoft.com/l-2/l-3/support-systemwizard.htm","workarounds":"","sysaffected":"","thanks":"Thanks to Richard Smith for making the CERT/CC aware of this vulnerability.","author":"This document was written by Cory F Cohen.","public":["http://www.tiac.net/users/smiths/acctroj/hp.htm","http://www.systemsoft.com/l-2/l-3/products-systemwizard.htm","http://www.systemsoft.com/l-2/l-3/support-systemwizard.htm"],"cveids":["CVE-1999-1206"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2000-08-21T14:47:02Z","publicdate":"1999-07-29T00:00:00Z","datefirstpublished":"2000-11-02T22:40:18Z","dateupdated":"2000-11-02T22:42:56Z","revision":7,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"17","cam_exploitation":"0","cam_internetinfrastructure":"1","cam_population":"15","cam_impact":"19","cam_easeofexploitation":"20","cam_attackeraccessrequired":"13","cam_scorecurrent":"25.00875","cam_scorecurrentwidelyknown":"29.176875","cam_scorecurrentwidelyknownexploited":"56.964375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":25.00875,"vulnote":null}