Husdawg, LLC Systems Requirements Lab 3, as used by Instant Expert Analysis, allows remote attackers to force the download and execution of arbitrary programs via by specifiying a malicious website argument to the Init method in (1) a certain ActiveX control (sysreqlab2.cab, sysreqlab.dll, sysreqlabsli.dll, or sysreqlab2.dll) and (2) a certain Java applet in RLApplet.class in sysreqlab2.jar or sysreqlab.jar.
References
Link | Resource |
---|---|
http://secunia.com/advisories/32236 | Vendor Advisory |
http://www.kb.cert.org/vuls/id/166651 | Third Party Advisory US Government Resource |
http://www.sec-consult.com/files/20081016-0_sysreqlab.txt | |
http://www.securityfocus.com/archive/1/497400 | |
http://www.securityfocus.com/bid/31752 | |
http://www.systemrequirementslab.com/bulletins/security_bulletin_1.html | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45873 |
Configurations
History
No history.
Information
Published : 2008-10-14 21:10
Updated : 2024-02-04 17:33
NVD link : CVE-2008-4385
Mitre link : CVE-2008-4385
CVE.ORG link : CVE-2008-4385
JSON object : View
Products Affected
systemrequirementslab
- system_requirements_lab
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')