This script is Copyright (C) 2013 Tenable Network Security, Inc.
The remote host has an ActiveX control installed that is affected by
a stack-based buffer overflow vulnerability.
The remote host has a version of the SAS Integration Technologies
Client 'SASspk.dll' ActiveX control installed that is affected by a
stack-based buffer overflow vulnerability in the
'RetrieveBinaryFile()' function. By tricking a user into opening a
specially crafted file, a remote attacker may be able to execute
arbitrary code or trigger a denial of service condition.
See also :
Apply the appropriate hotfix in the vendor's advisory.
Risk factor :
High / CVSS Base Score : 9.3
Public Exploit Available : true
Nessus Plugin ID: 67129 ()
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.