Lucene search

K
openvasCopyright (C) 2012 Greenbone AGOPENVAS:1361412562310802426
HistoryMar 14, 2012 - 12:00 a.m.

Microsoft Windows ActiveX Control Multiple Vulnerabilities (2647518)

2012-03-1400:00:00
Copyright (C) 2012 Greenbone AG
plugins.openvas.org
15

6.4 Medium

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.893 High

EPSS

Percentile

98.7%

This script will list all the vulnerable activex controls installed
on the remote windows machine with references and cause.

# SPDX-FileCopyrightText: 2012 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.802426");
  script_version("2023-07-25T05:05:58+0000");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2023-07-25 05:05:58 +0000 (Tue, 25 Jul 2023)");
  script_tag(name:"creation_date", value:"2012-03-14 13:25:40 +0530 (Wed, 14 Mar 2012)");
  script_name("Microsoft Windows ActiveX Control Multiple Vulnerabilities (2647518)");
  script_cve_id("CVE-2011-1388", "CVE-2011-1391", "CVE-2011-1392", "CVE-2012-0189");

  script_xref(name:"URL", value:"http://support.microsoft.com/kb/2647518");
  script_xref(name:"URL", value:"https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2012/2647518");

  script_tag(name:"qod_type", value:"registry");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2012 Greenbone AG");
  script_family("Windows");
  script_tag(name:"solution_type", value:"VendorFix");
  script_dependencies("secpod_reg_enum.nasl");
  script_require_ports(139, 445);
  script_mandatory_keys("SMB/registry_enumerated");

  script_tag(name:"impact", value:"Successful exploitation will let the remote attackers execute arbitrary code,
  and can compromise a vulnerable system.");

  script_tag(name:"affected", value:"- Microsoft Windows 7 Service Pack 1 and prior

  - Microsoft Windows XP Service Pack 3 and prior

  - Microsoft Windows 2003 Service Pack 2 and prior

  - Microsoft Windows Vista Service Pack 2 and prior

  - Microsoft Windows Server 2008 Service Pack 2 and prior");

  script_tag(name:"insight", value:"The flaws are due to errors in the handling of Biostat SamplePower,
  Blueberry Software Flashback Component and HP Photo Creative ActiveX controls.");

  script_tag(name:"summary", value:"This script will list all the vulnerable activex controls installed
  on the remote windows machine with references and cause.");

  script_tag(name:"solution", value:"Apply the patch   Workaround:
  Set the killbit for the following CLSIDs,

  {6e84d662-9599-11d2-9367-20cc03c10627},

  {7e00a3b0-8f5c-11d2-baa4-04f205c10000},

  {4ba9089c-ddfc-4206-b937-74484b06d305},

  {A3CD4BF9-EC17-47A4-833C-50A324D6FF35},

  {57733FF6-E100-4A4B-A7D1-A85AD17ABC54},

  {9B8E377B-7291-491A-B611-BB3E1D5F99F0},

  {ee5e14b0-4abf-409e-9c39-74f3d35bd85a},

  {b34b19f4-7ebe-46cb-807c-746e72ebb4b6},

  {7a7b986c-31e9-4286-88ca-b9dc481ca989},

  {8290cb76-9f61-458b-ad2c-3f6fd2e8cd7d},

  {dd7b057d-9020-4630-baf8-7a0cda04588d},

  {fc7F9cc6-e049-4698-8a25-59ad87c7dce2}.");

  script_xref(name:"URL", value:"http://support.microsoft.com/kb/2647518");
  exit(0);
}

include("smb_nt.inc");
include("secpod_reg.inc");
include("secpod_activex.inc");

if(!get_kb_item("SMB/WindowsVersion")){
  exit(0);
}

if(hotfix_missing(name:"2647518") == 0){
  exit(0);
}

clsids = make_list("{6e84d662-9599-11d2-9367-20cc03c10627}",
                   "{7e00a3b0-8f5c-11d2-baa4-04f205c10000}",
                   "{4ba9089c-ddfc-4206-b937-74484b06d305}",
                   "{A3CD4BF9-EC17-47A4-833C-50A324D6FF35}",
                   "{57733FF6-E100-4A4B-A7D1-A85AD17ABC54}",
                   "{9B8E377B-7291-491A-B611-BB3E1D5F99F0}",
                   "{ee5e14b0-4abf-409e-9c39-74f3d35bd85a}",
                   "{b34b19f4-7ebe-46cb-807c-746e72ebb4b6}",
                   "{7a7b986c-31e9-4286-88ca-b9dc481ca989}",
                   "{8290cb76-9f61-458b-ad2c-3f6fd2e8cd7d}",
                   "{dd7b057d-9020-4630-baf8-7a0cda04588d}",
                   "{fc7F9cc6-e049-4698-8a25-59ad87c7dce2}");

foreach clsid (clsids)
{
  if(is_killbit_set(clsid:clsid) == 0)
  {
    security_message( port: 0, data: "The target host was found to be vulnerable" );
    exit(0);
  }
}

6.4 Medium

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.893 High

EPSS

Percentile

98.7%