2008-4728 | Hummingbird Deployment Wizard ActiveX Control DeployRun.dll Remote Code Execution (BID-31799 / XFDB-45961)
|CVSS Meta Temp Score
CVSS is a standardized scoring system to determine possibilities of attacks. The Temp Score considers temporal factors like disclosure, exploit and countermeasures. The unique Meta Score calculates the average score of different sources to provide a normalized scoring system.
|Current Exploit Price (≈)
Our analysts are monitoring exploit markets and are in contact with vulnerability brokers. The range indicates the observed or calculated exploit price to be seen on exploit markets. A good indicator to understand the monetary effort required for and the popularity of an attack.
|CTI Interest Score
Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks. The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. A high score indicates an elevated risk to be targeted for this vulnerability.
A vulnerability, which was classified as very critical, has been found in Hummingbird Deployment Wizard 2008. This issue affects an unknown part in the library DeployRun.dll of the component ActiveX Control. Impacted is confidentiality, integrity, and availability. The summary by CVE is:
Multiple insecure method vulnerabilities in the DeployRun.DeploymentSetup.1 (DeployRun.dll) ActiveX control 10.0.0.44 in Hummingbird Deployment Wizard 2008 allow remote attackers to execute arbitrary programs via the (1) Run and (2) PerformUpdateAsync methods, and (3) modify arbitrary registry values via the SetRegistryValueAsString method. NOTE: the SetRegistryValueAsString method could be leveraged for code execution by specifying executable file values to Startup folders.
The weakness was published 10/23/2008 by shinnai (Website). The advisory is shared at xforce.iss.net. The identification of this vulnerability is CVE-2008-4728 since 10/23/2008. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. Technical details as well as a public exploit are known. The price for an exploit might be around USD $0-$5k at the moment (estimation calculated on 08/02/2021).
It is declared as proof-of-concept. The exploit is available at securityfocus.com.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 6529.
VulDB Meta Base Score: 9.8
VulDB Meta Temp Score: 9.3
NVD Base Score: 🔍
10/17/2008 +0 days 🔍
10/23/2008 +5 days 🔍
10/23/2008 +0 days 🔍
10/23/2008 +0 days 🔍
02/16/2011 +846 days 🔍
10/07/2012 +599 days 🔍
03/17/2015 +891 days 🔍
08/02/2021 +2330 days 🔍Advisory: xforce.iss.net
Status: Not defined
CVE: CVE-2008-4728 (🔍)
SecurityFocus: 31799 – Hummingbird Deployment Wizard 10 ‘DeployRun.dll’ ActiveX Control Multiple Security Vulnerabilities
Vulnerability Center: 29797 – Hummingbird Deployment Wizard 10.0.0.44 Remote Arbitrary Code Execution Vulnerability, Medium
scip Labs: https://www.scip.ch/en/?labs.20161013
Created: 03/17/2015 16:11
Updated: 08/02/2021 15:17
Changes: (4) source_cve_assigned source_exploitdb exploit_price_0day vulnerability_cvss2_nvd_basescore
Use the official API to access entries easily!