Anzio Web Print Object (WePO) ActiveX mainurl Parameter Buffer Overflow

high Nessus Plugin ID 34021

Synopsis

The remote Windows host has an ActiveX component that is susceptible to a buffer overflow attack.

Description

The remote host contains the Anzio Web Print Object (WePO) ActiveX component, which is used for 'push' printing from a web page or application.

The version of the control installed on the remote host reportedly contains a stack-based buffer overflow that can be triggered by passing long values of its 'mainurl' parameter. If an attacker can trick a user on the affected host into viewing a specially crafted HTML document, this method could be used to execute arbitrary code on the affected system subject to the user's privileges.

Solution

Upgrade to Anzio Web Print Object 3.2.30 or later.

See Also

http://www.nessus.org/u?6b18276f

https://seclists.org/bugtraq/2008/Aug/205

http://www.anzio.com/news/newwepo.htm

Plugin Details

Severity: High

ID: 34021

File Name: anzio_wepo_activex_mainurl_overflow.nasl

Version: 1.18

Type: local

Agent: windows

Family: Windows

Published: 8/21/2008

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

Core Impact

Reference Information

CVE: CVE-2008-3480

BID: 30545

CWE: 119

Secunia: 31554