AutoDesk LiveUpdate ActiveX Control ApplyPatch Method Execution

high Nessus Plugin ID 35627

Synopsis

The remote Windows host has an ActiveX control that can be used to execute programs.

Description

The version of the LiveUpdate ActiveX control, a component included with AutoCAD-based products and installed on the remote Windows host, reportedly allows execution of arbitrary programs via the second argument to the control's 'ApplyPatch' method. If an attacker can trick a user on the affected host into viewing a specially crafted HTML document, he can leverage these issues to execute arbitrary code on the affected system subject to the user's privileges.

Solution

Apply the hotfix referenced in the vendor advisory above and verify that the version of the control is 17.2.56.12 or or later.

See Also

https://seclists.org/bugtraq/2008/Sep/341

https://www.securityfocus.com/archive/1/496847/30/0/threaded

http://www.nessus.org/u?1c9c4525

Plugin Details

Severity: High

ID: 35627

File Name: liveupdate16_activex_applypatch_exec.nasl

Version: 1.14

Type: local

Agent: windows

Family: Windows

Published: 2/9/2009

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2008-4472

BID: 31490

CWE: 264