Tom Sawyer Software GET Extension Factory COM Object Instantiation Memory Corruption

high Nessus Plugin ID 54990

Synopsis

The remote Windows host has a COM object that is affected by a memory corruption vulnerability.

Description

Tom Sawyer Software's GET Extension Factory, a component used for graph visualization applications, is installed on the remote Windows host. It may have been bundled with a third-party application, such as the VMware Infrastructure Client or Embarcadero ER / Studio XE2.

The installed version of this component has a vulnerability in that it does not initialize COM objects properly inside Internet Explorer, which leads to a memory corruption vulnerability.

If an attacker can trick a user on the affected host into visiting a specially crafted web page, this issue could be leveraged to execute arbitrary code on the host subject to the user's privileges.

Solution

If the affected COM object is installed with the VMware Infrastructure Client, follow the instructions in VMware's advisory.

Otherwise, remove or disable the controls.

See Also

http://www.nessus.org/u?d795b7de

https://seclists.org/bugtraq/2011/Jun/38

https://seclists.org/bugtraq/2011/Sep/49

http://www.vmware.com/security/advisories/VMSA-2011-0009.html

http://lists.vmware.com/pipermail/security-announce/2011/000141.html

Plugin Details

Severity: High

ID: 54990

File Name: tomsawyer_get_extension_factory_activex.nasl

Version: 1.17

Type: local

Agent: windows

Family: Windows

Published: 6/7/2011

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/3/2011

Vulnerability Publication Date: 6/3/2011

Exploitable With

Core Impact

Metasploit (Tom Sawyer Software GET Extension Factory Remote Code Execution)

Reference Information

CVE: CVE-2011-2217

BID: 48099