Altiris ConsoleUtilities ActiveX RunCmd Method Overflow

High Nessus Plugin ID 42977


The remote Windows host has an ActiveX control with a buffer overflow vulnerability.


A vulnerable version of the Altiris ConsoleUtilities ActiveX control is installed on the remote host. This control comes with Altiris Deployment Solution, Altiris Notification Server, and Symantec Management Platform. There is a stack-based buffer overflow in the 'RunCmd()' function. A remote attacker could exploit this by tricking a user into requesting a maliciously crafted web page, which could lead to arbitrary code execution.


Remove all copies of the vulnerable control from this host, and apply the relevant hotfix referenced in the vendor's advisory.

See Also

Plugin Details

Severity: High

ID: 42977

File Name: altiris_aexnsconsoleutilities_runcmd_activex.nasl

Version: $Revision: 1.9 $

Type: local

Agent: windows

Family: Windows

Published: 2009/12/02

Modified: 2014/06/03

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/11/24

Vulnerability Publication Date: 2009/11/24

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Metasploit (Symantec Altiris Deployment Solution ActiveX Control Buffer Overflow)

Reference Information

CVE: CVE-2009-3033

BID: 37092

OSVDB: 60496

Secunia: 37462

CWE: 119