Cisco Linksys PlayerPT ActiveX Control SetSource() Multiple Overflows

This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an ActiveX control that is affected by
multiple buffer overflow vulnerabilities.

Description :

The Cisco Linksys PlayerPT ActiveX Control is installed on the remote
Windows host. The installed version of the control is affected by the
following buffer overflow vulnerabilities in the SetSource() method :

- The 'base64string' argument is not properly sanitized.
(EBD-ID #18641)

- The 'sURL' argument is not properly sanitized if the
'sFrameType' argument is set to 'mpeg'.
(CVE-2012-0284)

By tricking a victim into visiting a specially crafted page, an
attacker may be able to execute arbitrary code on the host.

See also :

http://seclists.org/bugtraq/2012/Mar/109
http://secunia.com/secunia_research/2012-25/

Solution :

Set the kill bit for the control as there is no fix at the time of
this writing.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 60107 ()

Bugtraq ID: 54588

CVE ID: CVE-2012-0284

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now