Flexera AdminStudio LaunchProcess Function ActiveX Control Remote Command Execution

medium Nessus Plugin ID 62392

Synopsis

The remote host has software installed that is affected by a remote command execution vulnerability.

Description

The remote host has the Flexera AdminStudio LaunchHelp ActiveX control installed. The control is affected by a remote command execution vulnerability that can be triggered by sending a directory traversal string to the 'LaunchProcess()' function.

By tricking a victim into visiting a specially crafted page, an attacker may be able to execute arbitrary commands on the host subject to the privileges of the user.

Solution

Apply the hotfix from Flexera.

See Also

https://www.zerodayinitiative.com/advisories/ZDI-11-318/

http://www.nessus.org/u?f940fbc9

Plugin Details

Severity: Medium

ID: 62392

File Name: flexera_adminstudio_launchhelp_activex_command_exec.nasl

Version: 1.14

Type: local

Agent: windows

Family: Windows

Published: 10/2/2012

Updated: 12/4/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.5

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2011-2657

Vulnerability Information

CPE: x-cpe:/a:flexera:adminstudio, cpe:/a:novell:zenworks_configuration_management

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/19/2011

Vulnerability Publication Date: 10/19/2011

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Metasploit (AdminStudio LaunchHelp.dll ActiveX Arbitrary Code Execution)

Reference Information

CVE: CVE-2011-2657

BID: 50274