MS11-027: Cumulative Security Update of ActiveX Kill Bits (2508272)

medium Nessus Plugin ID 53384


The remote Windows host is missing an update that disables selected ActiveX controls.


The remote Windows host has one or more ActiveX controls installed that could be abused to execute arbitrary code remotely if a user can be tricked into viewing a malicious web page using Internet Explorer.

Three of these controls are from Microsoft itself while the others are from third-party vendors that have asked Microsoft to prevent their controls from being run in Internet Explorer.


Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, and 2008 R2.

See Also

Plugin Details

Severity: Medium

ID: 53384

File Name: smb_nt_ms11-027.nasl

Version: 1.30

Type: local

Agent: windows

Published: 4/13/2011

Updated: 4/11/2022

Risk Information


Risk Factor: Critical

Score: 9.6


Risk Factor: Medium

Base Score: 5.1

Temporal Score: 4.4

Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/12/2011

Vulnerability Publication Date: 6/8/2010

Exploitable With

CANVAS (White_Phosphorus)

Core Impact

Metasploit (Microsoft WMI Administration Tools ActiveX Buffer Overflow)

Reference Information

CVE: CVE-2010-0811, CVE-2010-2193, CVE-2010-3973, CVE-2011-1205, CVE-2011-1243

BID: 40490, 40689, 45546, 47091, 47197

CERT: 725596

MSFT: MS11-027

MSKB: 2508272