AxWebRemoveCtrl ActiveX Control Arbitrary Code Execution

high Nessus Plugin ID 20297

Synopsis

The remote Windows host has an ActiveX control that is prone to remote code execution.

Description

The remote host contains an ActiveX control from SunnComm called AxWebRemoveCtrl. This control was likely installed by requesting an uninstaller for SunnComm's MediaMax digital rights management software used, for example, on select Sony CDs.

By design, AxWebRemoveCtrl allows any website to cause the control to download and execute code from an arbitrary URL. Should a user visit a maliciously crafted website, this would allow that website to execute arbitrary code on the remote host.

Solution

On the affected host, remove the file 'AxWebRemoveCtrl.ocx', and reboot.

See Also

http://www.freedom-to-tinker.com/?p=931

http://www.nessus.org/u?4d9bb81c

Plugin Details

Severity: High

ID: 20297

File Name: axwebremovectrl_activex_code_exec.nasl

Version: 1.15

Type: local

Agent: windows

Family: Windows

Published: 12/13/2005

Updated: 8/9/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Vulnerability Publication Date: 11/17/2005

Reference Information

CVE: CVE-2005-3693