HP HPeDiag ActiveX Control Multiple Vulnerabilities

This script is Copyright (C) 2008-2014 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an ActiveX control that allows reading and
writing of arbitrary files.

Description :

The remote host contains the HP Software Update software, installed by
default on many HP notebooks to support automatic software updates and
vulnerability patching.

The version of this software on the remote host includes an ActiveX
control, 'HpeDiag', that reportedly contains multiple insecure
methods - 'ReadTextFile()' and 'WriteTextFile()' - that are marked as
'Safe for Scripting' and allow for reading and overwriting arbitrary
files on the affected system. If a remote attacker can trick a user
on the affected host into visiting a specially crafted web page, this
issue could be leveraged to effectively destroy arbitrary files on
the remote host, potentially even files that are vital for its
operation, or to read the contents of arbitrary files.

See also :

http://www.securityfocus.com/advisories/14540

Solution :

Either use HP Software Update itself to update the software or disable
use of this ActiveX control from within Internet Explorer by setting
its kill bit.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 32055 (hp_update_hpediag_activex_insecure.nasl)

Bugtraq ID: 28929

CVE ID: CVE-2008-0712

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now