Tom Sawyer Software GET Extension Factory COM Object Instantiation Memory Corruption

High Nessus Plugin ID 54990


The remote Windows host has a COM object that is affected by a memory corruption vulnerability.


Tom Sawyer Software's GET Extension Factory, a component used for graph visualization applications, is installed on the remote Windows host. It may have been bundled with a third-party application, such as the VMware Infrastructure Client or Embarcadero ER / Studio XE2.

The installed version of this component has a vulnerability in that it does not initialize COM objects properly inside Internet Explorer, which leads to a memory corruption vulnerability.

If an attacker can trick a user on the affected host into visiting a specially crafted web page, this issue could be leveraged to execute arbitrary code on the host subject to the user's privileges.


If the affected COM object is installed with the VMware Infrastructure Client, follow the instructions in VMware's advisory.

Otherwise, remove or disable the controls.

See Also

Plugin Details

Severity: High

ID: 54990

File Name: tomsawyer_get_extension_factory_activex.nasl

Version: $Revision: 1.15 $

Type: local

Agent: windows

Family: Windows

Published: 2011/06/07

Modified: 2016/11/23

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/06/03

Vulnerability Publication Date: 2011/06/03

Exploitable With

Core Impact

Metasploit (Tom Sawyer Software GET Extension Factory Remote Code Execution)

Reference Information

CVE: CVE-2011-2217

BID: 48099

OSVDB: 73211