WebGate Webeye ActiveX Control Stack Based Buffer Overflow Vulnerability

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote host has an ActiveX control with a buffer overflow
vulnerability.

Description :

The WebGate 'webeye.ocx' ActiveX control installed on the remote host
is affected by a stack-based buffer overflow vulnerability due to
improperly processing input to the 'ip_address' parameter. A remote
attacker, using specially crafted input, can exploit this to execute
arbitrary code.

See also :

http://www.nessus.org/u?5e5be36d
https://ics-cert.us-cert.gov/advisories/ICSA-14-324-01
http://support.microsoft.com/kb/240797

Solution :

Uninstall the ActiveX control or disable it by setting the 'killbit'.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 81787 ()

Bugtraq ID: 71193

CVE ID: CVE-2014-8388

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now