MS11-027: Cumulative Security Update of ActiveX Kill Bits (2508272)

medium Nessus Plugin ID 53384

Synopsis

The remote Windows host is missing an update that disables selected ActiveX controls.

Description

The remote Windows host has one or more ActiveX controls installed that could be abused to execute arbitrary code remotely if a user can be tricked into viewing a malicious web page using Internet Explorer.

Three of these controls are from Microsoft itself while the others are from third-party vendors that have asked Microsoft to prevent their controls from being run in Internet Explorer.

Solution

Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, and 2008 R2.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2011/ms11-027

Plugin Details

Severity: Medium

ID: 53384

File Name: smb_nt_ms11-027.nasl

Version: 1.30

Type: local

Agent: windows

Published: 4/13/2011

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.4

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/12/2011

Vulnerability Publication Date: 6/8/2010

Exploitable With

CANVAS (White_Phosphorus)

Core Impact

Metasploit (Microsoft WMI Administration Tools ActiveX Buffer Overflow)

Reference Information

CVE: CVE-2010-0811, CVE-2010-2193, CVE-2010-3973, CVE-2011-1205, CVE-2011-1243

BID: 40490, 40689, 45546, 47091, 47197

CERT: 725596

MSFT: MS11-027

MSKB: 2508272