MS08-070: Vulnerabilities in Visual Basic 6.0 ActiveX Controls Could Allow Remote Code Execution (932349)

high Nessus Plugin ID 35069


Arbitrary code can be executed on the remote host through the web client.


The remote host contains a version of the ActiveX control for Visual Basic 6.0 Runtime Extended Files that may allow an attacker to execute arbitrary code on the remote host by constructing a malicious web page and enticing a victim to visit it.

Note that this control may have been included with Visual Studio or FoxPro or as part of a third-party application created by one of those products.


Microsoft has released a set of patches for Microsoft Office / Frontpage / FoxPro / Studio.

See Also

Plugin Details

Severity: High

ID: 35069

File Name: smb_nt_ms08-070.nasl

Version: 1.43

Type: local

Agent: windows

Published: 12/10/2008

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information


Risk Factor: Critical

Score: 9.0


Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:microsoft:visual_basic, cpe:/, cpe:/a:microsoft:visual_foxpro, cpe:/a:microsoft:visual_frontpage, cpe:/a:microsoft:project

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/9/2008

Vulnerability Publication Date: 8/13/2008

Exploitable With

Core Impact

Metasploit (Microsoft Visual Studio Mdmask32.ocx ActiveX Buffer Overflow)

Reference Information

CVE: CVE-2008-3704, CVE-2008-4252, CVE-2008-4253, CVE-2008-4254, CVE-2008-4255, CVE-2008-4256

BID: 30674, 32591, 32592, 32612, 32613, 32614

CWE: 119, 189, 264, 399

IAVA: 2008-A-0088

MSFT: MS08-070

MSKB: 932349