Office Viewer Component ActiveX (officeviewer.ocx) HttpDownloadFile Method Traversal Arbitrary File Overwrite

High Nessus Plugin ID 26013


The remote Windows host has an ActiveX control with an insecure method.


The remote host contains the Office Viewer Component, an ActiveX control for working with Microsoft Office documents.

The version of this control installed on the remote host reportedly contains an insecure method, 'HttpDownloadFile'. If an attacker can trick a user on the affected host into visiting a specially crafted web page, he may be able to use this method to place arbitrary files on the host subject to the user's privileges.


Upgrade to Office Viewer Component version 5.2 or later.

See Also

Plugin Details

Severity: High

ID: 26013

File Name: officeviewer_httpdownloadfile_activex_insecure.nasl

Version: $Revision: 1.13 $

Type: local

Agent: windows

Family: Windows

Published: 2007/09/10

Modified: 2016/05/20

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:W/RC:ND

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2007/08/16

Reference Information

CVE: CVE-2007-4420

BID: 25344

EDB-ID: 4290

OSVDB: 38794

CWE: 22