WebGate Webeye ActiveX Control Stack Based Buffer Overflow Vulnerability

This script is Copyright (C) 2015 Tenable Network Security, Inc.

Synopsis :

The remote host has an ActiveX control with a buffer overflow

Description :

The WebGate 'webeye.ocx' ActiveX control installed on the remote host
is affected by a stack-based buffer overflow vulnerability due to
improperly processing input to the 'ip_address' parameter. A remote
attacker, using specially crafted input, can exploit this to execute
arbitrary code.

See also :


Solution :

Uninstall the ActiveX control or disable it by setting the 'killbit'.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 81787 ()

Bugtraq ID: 71193

CVE ID: CVE-2014-8388

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now