2X ApplicationServer TuxSystem ActiveX ExportSettings() Method Arbitrary File Overwrite

Medium Nessus Plugin ID 58484


The remote Windows host has an ActiveX control that is affected by a file overwrite vulnerability.


The install of the 2X ApplicationServer TuxSystem ActiveX control on the remote host reportedly could be abused to create or overwrite arbitrary files on the affected host using its 'ExportSettings()' method.

By tricking a user into opening a specially crafted web page, a remote, unauthenticated attacker can overwrite files on the affected system subject to the user's privileges.


Remove or disable the control as fixes are not available.

Plugin Details

Severity: Medium

ID: 58484

File Name: 2x_applicationserver_activex_file_overwrite.nasl

Version: $Revision: 1.6 $

Type: local

Agent: windows

Family: Windows

Published: 2012/03/26

Modified: 2013/01/15

Dependencies: 13855

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:POC/RL:W/RC:ND

Vulnerability Information

CPE: cpe:/a:2x:applicationserver

Required KB Items: SMB/Registry/Enumerated, SMB/WindowsVersion

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2012/02/03

Reference Information

CVE: CVE-2012-1065

BID: 51856

OSVDB: 78831

EDB-ID: 18625

Secunia: 47657