This script is Copyright (C) 2013 Tenable Network Security, Inc.
The remote host has an ActiveX control installed that is affected by
a stack-based buffer overflow vulnerability.
The remote host has a version of the SAS Integration Technologies
Client 'SASspk.dll' ActiveX control installed that is affected by a
stack-based buffer overflow vulnerability in the
'RetrieveBinaryFile()' function. By tricking a user into opening a
specially crafted file, a remote attacker may be able to execute
arbitrary code or trigger a denial of service condition.
See also :
Apply the appropriate hotfix in the vendor's advisory.
Risk factor :
High / CVSS Base Score : 9.3
Public Exploit Available : true