2X ApplicationServer TuxSystem ActiveX ExportSettings() Method Arbitrary File Overwrite

medium Nessus Plugin ID 58484

Synopsis

The remote Windows host has an ActiveX control that is affected by a file overwrite vulnerability.

Description

The install of the 2X ApplicationServer TuxSystem ActiveX control on the remote host reportedly could be abused to create or overwrite arbitrary files on the affected host using its 'ExportSettings()' method.

By tricking a user into opening a specially crafted web page, a remote, unauthenticated attacker can overwrite files on the affected system subject to the user's privileges.

Solution

Remove or disable the control as fixes are not available.

Plugin Details

Severity: Medium

ID: 58484

File Name: 2x_applicationserver_activex_file_overwrite.nasl

Version: 1.7

Type: local

Agent: windows

Family: Windows

Published: 3/26/2012

Updated: 6/27/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:2x:applicationserver

Required KB Items: SMB/Registry/Enumerated, SMB/WindowsVersion

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2/3/2012

Reference Information

CVE: CVE-2012-1065

BID: 51856

Secunia: 47657