Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Windows --> Category: infos

AxWebRemoveCtrl ActiveX Remote Code Execution Vulnerability Vulnerability Scan


Vulnerability Scan Summary
Checks for remote code execution vulnerability in AxWebRemoveCtrl ActiveX control

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote Windows host has an ActiveX control that is prone to remote
code execution.

Description :

The remote host contains an ActiveX control from SunnComm called
AxWebRemoveCtrl. This control was likely installed by requesting an
uninstaller for SunnComm's MediaMax digital rights management software
used, for example, on select Sony CDs.

By design, AxWebRemoveCtrl allows any web site to cause the control to
download and execute code from an arbitrary URL. Should a user visit
a maliciously-crafted website, this would allow that website to
execute arbitrary code on the remote host.

See also :

http://www.freedom-to-tinker.com/?p=931
http://www.sunncomm.com/support/faq/

Solution :

On the affected host, remove the file 'AxWebRemoveCtrl.ocx', and
reboot.

Threat Level:

Medium / CVSS Base Score : 6
(AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.