SAS Integration Technologies Client ActiveX Stack Buffer Overflow Vulnerability

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote host has an ActiveX control installed that is affected by
a stack-based buffer overflow vulnerability.

Description :

The remote host has a version of the SAS Integration Technologies
Client 'SASspk.dll' ActiveX control installed that is affected by a
stack-based buffer overflow vulnerability in the
'RetrieveBinaryFile()' function. By tricking a user into opening a
specially crafted file, a remote attacker may be able to execute
arbitrary code or trigger a denial of service condition.

See also :

http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5142.php
http://support.sas.com/kb/49/961.html

Solution :

Apply the appropriate hotfix in the vendor's advisory.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 67129 ()

Bugtraq ID:

CVE ID: