BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

Quest InTrust ActiveX Multiple Vulnerabilites

Disclosed March 30, 2012    Workaround Available

Vulnerability Description:

Quest InTrust contains multiple vulnerabilities in its ActiveX controls. Specifically, the SaveToFile() and Add() functions within ArDoc.dll and AnnotateX.dll allow an attacker to arbitrarily access memory, and overwrite arbitrary files, respectively. Successful exploitation may allow an attacker to execute arbitrary code within the context of the currently logged on user.

Vendors:

Quest Software (Dell)

Vulnerable Software/Devices:

  • Quest InTrust 10.x

Vulnerability Severity:

High

Exploit Availability:

N/A

Exploit Impact:

Remote Code Execution
Remote Code Execution Exploitation of this vulnerability is possible through the use of methods like drive-by attacks. Remote attackers who successfully exploit this vulnerability will be able to execute code on the vulnerable system with the same rights as the currently logged on user.

BeyondTrust Prevention and Detection:

BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

  • 16152 - Quest InTrust Multiple Vulnerabilities

Mitigation:

Set the kill-bit for the vulnerable ActiveX controls: EF600D71-358F-11D1-8FD4-00AA00BD091C, C6FAAD6A-68AE-452B-9F7A-9293408F51EF, and EB5920E8-F6FA-4080-ADDC-AA03FA23E2AB.

Links:

CVE(s):

None

Leave a Reply