NTR ActiveX Control < 2.0.4.8 Multiple Vulnerabilities

This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.


Synopsis :

An ActiveX control installed on the remote Windows host is affected
by multiple vulnerabilities.

Description :

At least one version of the NTR ActiveX control installed on the
remote Windows host is earlier than 2.0.4.8. As such, it reportedly
is affected by the following vulnerabilities :

- Four stack-based buffer overflows exist involving the
'bstrUrl' parameter of the 'StartModule()' method, the
'bstrParams' parameter of the 'Check()' method, and the
'bstrUrl' parameter of the 'Download()' and
'DownloadModule()' methods. (CVE-2012-0266)

- An input validation vulnerability exists involving the
'iModule' parameter of the 'StopModule()' method.
(CVE-2012-0267)

If an attacker can trick a user on the affected host into visiting a
specially crafted web page, these issues could be leveraged to
execute arbitrary code on the host subject to the user's privileges.

See also :

http://secunia.com/secunia_research/2012-1/
http://secunia.com/secunia_research/2012-2/
http://www.securityfocus.com/archive/1/521210/30/0/threaded
http://www.securityfocus.com/archive/1/521211/30/0/threaded

Solution :

Upgrade affected installs to version 2.0.4.8 or later as that
reportedly resolves the vulnerability.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 57556 ()

Bugtraq ID: 51374

CVE ID: CVE-2012-0266
CVE-2012-0267

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now