SAS Integration Technologies Client ActiveX Stack Buffer Overflow

This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.


Synopsis :

The remote host has an ActiveX control installed that is affected by
a stack-based buffer overflow.

Description :

The version of the SAS Integration Technologies Client installed on
the remote host is affected by a stack-based buffer overflow condition
in the 'SASspk.dll' ActiveX control due to improper validation of
user-supplied input to the RetrieveBinaryFile() function via the
'bstFileName' parameter. An unauthenticated, remote attacker can
exploit this, via a crafted file, to cause a denial of service or the
execution of arbitrary code.

See also :

http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5142.php
http://support.sas.com/kb/49/961.html

Solution :

Apply the appropriate hotfix in the vendor's advisory.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 67129 ()

Bugtraq ID:

CVE ID:

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial