AxWebRemoveCtrl ActiveX Control Arbitrary Code Execution

High Nessus Plugin ID 20297


The remote Windows host has an ActiveX control that is prone to remote code execution.


The remote host contains an ActiveX control from SunnComm called AxWebRemoveCtrl. This control was likely installed by requesting an uninstaller for SunnComm's MediaMax digital rights management software used, for example, on select Sony CDs.

By design, AxWebRemoveCtrl allows any website to cause the control to download and execute code from an arbitrary URL. Should a user visit a maliciously crafted website, this would allow that website to execute arbitrary code on the remote host.


On the affected host, remove the file 'AxWebRemoveCtrl.ocx', and reboot.

See Also

Plugin Details

Severity: High

ID: 20297

File Name: axwebremovectrl_activex_code_exec.nasl

Version: $Revision: 1.14 $

Type: local

Agent: windows

Family: Windows

Published: 2005/12/13

Modified: 2015/01/12

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Vulnerability Publication Date: 2005/11/17

Reference Information

CVE: CVE-2005-3693

OSVDB: 20950