Synopsis
The remote Windows host has an ActiveX control that is susceptible to multiple buffer overflow vulnerabilities.
Description
The Windows remote host contains an ActiveX control from Authentium's Command Antivirus or a third-party antivirus product that is based on it.
The version of this ActiveX control on the remote host reportedly contains multiple buffer overflow vulnerabilities. A remote attacker may be able to leverage these issues to execute arbitrary code on the remote host subject to the privileges of the current user.
Solution
Contact the software vendor for updates or disable the use of this ActiveX control from within Internet Explorer by setting the kill bits for the associated CLSIDs.
Plugin Details
File Name: command_av_odapi_activex_overflows.nasl
Agent: windows
Supported Sensors: Nessus Agent, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
Vulnerability Information
Required KB Items: SMB/Registry/Enumerated
Exploit Ease: No known exploits are available
Vulnerability Publication Date: 6/1/2007