This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.
The remote Windows host has at least one ActiveX control that is
affected by several buffer overflow vulnerabilities.
The remote host contains one or more versions of the 'beans.ocx'
ActiveX control, distributed as a part of Oracle JInitiator.
The version of at least one of these controls on the remote host
reportedly is affected by multiple and as-yet unspecified stack buffer
overflows in its initialization parameters. If an attacker can trick
a user on the affected host into visiting a specially crafted web
page, this issue could be leveraged to execute arbitrary code on the
host subject to the user's privileges.
See also :
Disable the use of any reported ActiveX controls from within Internet
Explorer by setting their kill bits.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.0
Public Exploit Available : true