Flexera AdminStudio LaunchProcess Function ActiveX Control Remote Command Execution

High Nessus Plugin ID 62392


The remote host has software installed that is affected by a remote command execution vulnerability.


The remote host has the Flexera AdminStudio LaunchHelp ActiveX control installed. The control is affected by a remote command execution vulnerability that can be triggered by sending a directory traversal string to the 'LaunchProcess()' function.

By tricking a victim into visiting a specially crafted page, an attacker may be able to execute arbitrary commands on the host subject to the privileges of the user.


Apply the hotfix from Flexera.

See Also



Plugin Details

Severity: High

ID: 62392

File Name: flexera_adminstudio_launchhelp_activex_command_exec.nasl

Version: $Revision: 1.9 $

Type: local

Agent: windows

Family: Windows

Published: 2012/10/02

Modified: 2016/12/08

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: x-cpe:/a:flexera:adminstudio, cpe:/a:novell:zenworks_configuration_management

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/10/19

Vulnerability Publication Date: 2011/10/19

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Metasploit (AdminStudio LaunchHelp.dll ActiveX Arbitrary Code Execution)

Reference Information

CVE: CVE-2011-2657

BID: 50274

OSVDB: 76700

EDB-ID: 19718