{"vuid":"VU#41408","idnumber":"41408","name":"Wang/Kodak Image Scan ActiveX Control","keywords":["ActiveX Control","Wang","Kodak","imgscan.ocx"],"overview":"","clean_desc":"The Image Admin control is incorrectly marked safe for scripting. This control is sometimes identified as from \"Kodak\" and other times as from \"Wang\". The Image Admin control is one of several controls used to provide image editting services through a web site. Because the control is marked safe-for-scripting, an attacker may be able to script this control and exploit the vulnerability when you visit a web page. This control is implemented in the file imgscan.ocx and has a ClassID of {84926CA0-2941-101C-816F-0E6013114B7F}. This vulnerability is closely related to these vulnerabilities: VU#26924 Wang/Kodak Image Admin ActiveX Control\nVU#41408 Wang/Kodak Image Scan ActiveX Control\nVU#23412 Wang/Kodak Image Edit/Annotation ActiveX Control\nVU#24839 Wang/Kodak Image Thumbnail ActiveX Control\nVU#9162 Wang/Kodak Image Edit ActiveX Control Each of these controls appears to have a similar problem.","impact":"An attacker can use the control to create files on a system viewing a malicious web page. By carefully constructing the files and specfying which files to overwrite, an attacker can cause arbitrary commands to be executed. The attacker can also overwrite existing files, causing the system to fail.","resolution":"Apply a patch Apply the patch provided by Microsoft in Security Bulletin MS99-037. This patch sets the kill bit which prevents the control from being loaded by Internet Explorer.","workarounds":"Disable \"Script ActiveX controls marked safe for scripting\" In your Internet Explorer security settings, set this option to \"disable\" or \"prompt\".","sysaffected":"","thanks":"Thanks to Richard Smith for reporting this vulnerability to the CERT/CC.","author":"This document was written by Cory F Cohen.","public":["http://www.microsoft.com/technet/Security/Bulletin/MS99-037.asp","http://www.microsoft.com/technet/security/bulletin/fq99-037.asp"],"cveids":["CVE-1999-0702"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2000-08-18T18:42:13Z","publicdate":"1999-09-10T00:00:00Z","datefirstpublished":"2000-10-31T20:12:14Z","dateupdated":"2000-10-31T20:46:02Z","revision":16,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"15","cam_impact":"12","cam_easeofexploitation":"10","cam_attackeraccessrequired":"15","cam_scorecurrent":"7.59375","cam_scorecurrentwidelyknown":"10.125","cam_scorecurrentwidelyknownexploited":"20.25","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.59375,"vulnote":null}