AutoDesk LiveUpdate ActiveX Control ApplyPatch Method Execution

High Nessus Plugin ID 35627


The remote Windows host has an ActiveX control that can be used to execute programs.


The version of the LiveUpdate ActiveX control, a component included with AutoCAD-based products and installed on the remote Windows host, reportedly allows execution of arbitrary programs via the second argument to the control's 'ApplyPatch' method. If an attacker can trick a user on the affected host into viewing a specially crafted HTML document, he can leverage these issues to execute arbitrary code on the affected system subject to the user's privileges.


Apply the hotfix referenced in the vendor advisory above and verify that the version of the control is or or later.

See Also

Plugin Details

Severity: High

ID: 35627

File Name: liveupdate16_activex_applypatch_exec.nasl

Version: $Revision: 1.12 $

Type: local

Agent: windows

Family: Windows

Published: 2009/02/09

Modified: 2017/07/14

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2008-4472

BID: 31490

EDB-ID: 6630

OSVDB: 49047

CWE: 264