AxWebRemoveCtrl ActiveX Control Arbitrary Code Execution

This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an ActiveX control that is prone to remote
code execution.

Description :

The remote host contains an ActiveX control from SunnComm called
AxWebRemoveCtrl. This control was likely installed by requesting an
uninstaller for SunnComm's MediaMax digital rights management software
used, for example, on select Sony CDs.

By design, AxWebRemoveCtrl allows any website to cause the control to
download and execute code from an arbitrary URL. Should a user visit a
maliciously crafted website, this would allow that website to execute
arbitrary code on the remote host.

See also :

http://www.freedom-to-tinker.com/?p=931
http://www.nessus.org/u?4d9bb81c

Solution :

On the affected host, remove the file 'AxWebRemoveCtrl.ocx', and
reboot.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

Family: Windows

Nessus Plugin ID: 20297 (axwebremovectrl_activex_code_exec.nasl)

Bugtraq ID:

CVE ID: CVE-2005-3693

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now