Synopsis
An ActiveX control on the remote Windows host could allow installation of arbitrary programs.
Description
The version of the TuxClientSystem ActiveX control, part of the 2X Client, installed on the remote Windows host is earlier than 10.1 Build 1239. As such, its 'InstallClient()' method reportedly accepts a URL to an MSI package and allows installation of an application without explicit user approval.
If an attacker can trick an administrator on the affected system into viewing a malicious HTML document, he could leverage this issue to install an arbitrary application on the system.
Solution
Upgrade to 2X Client 10.1 Build 1239 as that is reported to address the vulnerability.
Plugin Details
File Name: 2x_tuxclientsystem_activex_installclient.nasl
Agent: windows
Supported Sensors: Nessus Agent, Nessus
Vulnerability Information
Required KB Items: SMB/Registry/Enumerated
Exploit Ease: Exploits are available
Patch Publication Date: 3/1/2012
Vulnerability Publication Date: 3/8/2012
Reference Information
BID: 52359