Anzio Web Print Object (WePO) ActiveX mainurl Parameter Buffer Overflow

High Nessus Plugin ID 34021


The remote Windows host has an ActiveX component that is susceptible to a buffer overflow attack.


The remote host contains the Anzio Web Print Object (WePO) ActiveX component, which is used for 'push' printing from a web page or application.

The version of the control installed on the remote host reportedly contains a stack-based buffer overflow that can be triggered by passing long values of its 'mainurl' parameter. If an attacker can trick a user on the affected host into viewing a specially crafted HTML document, this method could be used to execute arbitrary code on the affected system subject to the user's privileges.


Upgrade to Anzio Web Print Object 3.2.30 or later.

See Also

Plugin Details

Severity: High

ID: 34021

File Name: anzio_wepo_activex_mainurl_overflow.nasl

Version: $Revision: 1.16 $

Type: local

Agent: windows

Family: Windows

Published: 2008/08/21

Modified: 2016/10/07

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

Core Impact

Reference Information

CVE: CVE-2008-3480

BID: 30545

OSVDB: 47592

Secunia: 31554

CWE: 119