CVE ID | CVE-2015-2092 |
CVSS SCORE | 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P |
AFFECTED VENDORS |
Agilent Technologies |
AFFECTED PRODUCTS |
Feature Extraction |
TREND MICRO CUSTOMER PROTECTION | Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['13937']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com |
VULNERABILITY DETAILS |
The specific flaw exists within the AnnotationX.AnnList.1 ActiveX control included with the software. An attacker can use an unvalidated object parameter in the Insert() function to execute arbitrary code in the context of the browser. |
ADDITIONAL DETAILS |
05/05/2014 - ZDI request for vulnerability contact with vendor -- Mitigation: -- Vendor Response: Agilent recently released a software patch with Windows installers to address exposure to potential execution of the arbitrary code associated with Internet Explorer while ActiveX is activated. All Feature Extraction users (Version 12 or older) are strongly encouraged to execute the fix described below for protection against a potential malicious web page visited with Internet Explorer. http://www.genomics.agilent.com/article.jsp?pageId=4500002
|
DISCLOSURE TIMELINE |
|
CREDIT | rgod |