NTR ActiveX Control < Multiple Vulnerabilities

High Nessus Plugin ID 57556


An ActiveX control installed on the remote Windows host is affected by multiple vulnerabilities.


At least one version of the NTR ActiveX control installed on the remote Windows host is earlier than As such, it reportedly is affected by the following vulnerabilities :

- Four stack-based buffer overflows exist involving the 'bstrUrl' parameter of the 'StartModule()' method, the 'bstrParams' parameter of the 'Check()' method, and the 'bstrUrl' parameter of the 'Download()' and 'DownloadModule()' methods. (CVE-2012-0266)

- An input validation vulnerability exists involving the 'iModule' parameter of the 'StopModule()' method.

If an attacker can trick a user on the affected host into visiting a specially crafted web page, these issues could be leveraged to execute arbitrary code on the host subject to the user's privileges.


Upgrade affected installs to version or later as that reportedly resolves the vulnerability.

See Also





Plugin Details

Severity: High

ID: 57556

File Name: ntr_2_0_4_8_activex.nasl

Version: $Revision: 1.12 $

Type: local

Agent: windows

Family: Windows

Published: 2012/01/16

Modified: 2017/10/11

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/12/27

Vulnerability Publication Date: 2012/01/11

Exploitable With

CANVAS (White_Phosphorus)

Core Impact

Metasploit (NTR ActiveX Control StopModule() Remote Code Execution)

Reference Information

CVE: CVE-2012-0266, CVE-2012-0267

BID: 51374

OSVDB: 78252, 78253, 88104, 88105, 88106

Secunia: 45166