This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.
The remote host has an ActiveX control installed that is affected by
a stack-based buffer overflow.
The version of the SAS Integration Technologies Client installed on
the remote host is affected by a stack-based buffer overflow condition
in the 'SASspk.dll' ActiveX control due to improper validation of
user-supplied input to the RetrieveBinaryFile() function via the
'bstFileName' parameter. An unauthenticated, remote attacker can
exploit this, via a crafted file, to cause a denial of service or the
execution of arbitrary code.
See also :
Apply the appropriate hotfix in the vendor's advisory.
Risk factor :
High / CVSS Base Score : 9.3
Public Exploit Available : true
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now