SAS Integration Technologies Client ActiveX Stack Buffer Overflow

high Nessus Plugin ID 67129

Synopsis

The remote host has an ActiveX control installed that is affected by a stack-based buffer overflow.

Description

The version of the SAS Integration Technologies Client installed on the remote host is affected by a stack-based buffer overflow condition in the 'SASspk.dll' ActiveX control due to improper validation of user-supplied input to the RetrieveBinaryFile() function via the 'bstFileName' parameter. An unauthenticated, remote attacker can exploit this, via a crafted file, to cause a denial of service or the execution of arbitrary code.

Solution

Apply the appropriate hotfix in the vendor's advisory.

See Also

https://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5142.php

http://support.sas.com/kb/49/961.html

Plugin Details

Severity: High

ID: 67129

File Name: sas_sasspk_activex.nasl

Version: 1.5

Type: local

Agent: windows

Family: Windows

Published: 7/2/2013

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Vulnerability Information

CPE: cpe:/a:sas:sas_integration_technologies

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/17/2013

Vulnerability Publication Date: 5/25/2013