|CVSS SCORE||6.8, (AV:N/AC:M/Au:N/C:P/I:P/A:P)|
|TREND MICRO CUSTOMER PROTECTION||Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 20638. For further product information on the TippingPoint IPS: http://www.tippingpoint.com|
The specific flaws exist within the implementation of the CopyRange and SwapTable methods of the F1BookView ActiveX control. The methods accept integer values and interpret them as addresses of structures in memory. An attacker can leverage this vulnerability to achieve code execution in the context of the process.
Schneider Electric has issued an update to correct this vulnerability. More details can be found at:
|CREDIT||Ariele Caltabiano (Kimiya)