SAS Integration Technologies Client ActiveX Stack Buffer Overflow

This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.

Synopsis :

The remote host has an ActiveX control installed that is affected by
a stack-based buffer overflow.

Description :

The version of the SAS Integration Technologies Client installed on
the remote host is affected by a stack-based buffer overflow condition
in the 'SASspk.dll' ActiveX control due to improper validation of
user-supplied input to the RetrieveBinaryFile() function via the
'bstFileName' parameter. An unauthenticated, remote attacker can
exploit this, via a crafted file, to cause a denial of service or the
execution of arbitrary code.

See also :

Solution :

Apply the appropriate hotfix in the vendor's advisory.

Risk factor :

High / CVSS Base Score : 9.3
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 67129 ()

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now