Quest InTrust contains multiple vulnerabilities in its ActiveX controls. Specifically, the SaveToFile() and Add() functions within ArDoc.dll and AnnotateX.dll allow an attacker to arbitrarily access memory, and overwrite arbitrary files, respectively. Successful exploitation may allow an attacker to execute arbitrary code within the context of the currently logged on user.
Quest Software (Dell)
- Quest InTrust 10.x
Remote Code Execution
Remote Code Execution Exploitation of this vulnerability is possible through the use of methods like drive-by attacks. Remote attackers who successfully exploit this vulnerability will be able to execute code on the vulnerable system with the same rights as the currently logged on user.
BeyondTrust Prevention and Detection:
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.
- 16152 - Quest InTrust Multiple Vulnerabilities
Set the kill-bit for the vulnerable ActiveX controls: EF600D71-358F-11D1-8FD4-00AA00BD091C, C6FAAD6A-68AE-452B-9F7A-9293408F51EF, and EB5920E8-F6FA-4080-ADDC-AA03FA23E2AB.