LuraWave JP2 ActiveX Control < jp2_x.dll Remote Buffer Overflow

high Nessus Plugin ID 57939


The remote Windows host has an ActiveX control that is affected by a buffer overflow vulnerability.


The version of the LuraWave JP2 ActiveX control installed on the remote Windows host reportedly contains a stack-based buffer overflow vulnerability. If an attacker can trick a user on the affected host into viewing a specially crafted HTML document, he can leverage this issue to execute arbitrary code on the affected system subject to the user's privileges.


Upgrade to version or later.

Plugin Details

Severity: High

ID: 57939

File Name: lurawave_jp2_activex_overflow.nasl

Version: 1.5

Type: local

Agent: windows

Family: Windows

Published: 2/14/2012

Updated: 7/14/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:luratech:lurawave_jp2_activex_control

Required KB Items: SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Patch Publication Date: 1/31/2012

Vulnerability Publication Date: 1/31/2012

Reference Information

CVE: CVE-2012-0977

BID: 51744

Secunia: 47350