Symantec AppStream Client LaunchObj ActiveX Control Multiple Unsafe Methods (SYM09-001)

High Nessus Plugin ID 35403


The remote Windows host has an ActiveX control that can be used to download and execute arbitrary code.


The version of the LaunchObj ActiveX control, a component included with Symantec AppStream Client / Altiris Streaming Agent and installed on the remote Windows host, reportedly contains a number of unsafe methods, such as 'installAppMgr()', that can be used to download and execute arbitrary code. If an attacker can trick a user on the affected host into viewing a specially crafted HTML document, he can leverage these issues to execute arbitrary code on the affected system subject to the user's privileges.


Upgrade to Symantec AppStream Client 5.2.2 SP3 MP1 or later and verify that the version of the control is or later.

See Also

Plugin Details

Severity: High

ID: 35403

File Name: appstream_launchobj_activex_sym09_001.nasl

Version: $Revision: 1.13 $

Type: local

Agent: windows

Family: Windows

Published: 2009/01/17

Modified: 2017/10/11

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Metasploit (Symantec AppStream LaunchObj ActiveX Control Arbitrary File Download and Execute)

Reference Information

CVE: CVE-2008-4388

BID: 33247

OSVDB: 51410

CERT: 194505

Secunia: 33582

CWE: 20