Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks for remote code execution vulnerability in CodeSupport ActiveX control
Detailed Explanation for this Vulnerability Assessment
The remote Windows host has an ActiveX control that is prone to remote
The remote host contains an ActiveX control from First4Internet called
CodeSupport. This control was likely installed by requesting an
uninstaller for Sony's XCP digital rights management software.
CodeSupport is marked as safe for scripting and makes several methods
available for any web page to use. Should a user visit a
maliciously-crafted website, this would permit that website to execute
arbitrary code on the remote host.
See also :
On the affected host, locate the file 'codesupport.ocx',
run the following DOS commands, and reboot.
regsvr32 /u '%windir%\downloaded program files\codesupport.ocx'
cmd /k del '%windir%\downloaded program files\codesupport.*'
assuming it's located in '%windir%\downloaded program files'.
Network Security Threat Level:
Medium / CVSS Base Score : 6
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security
|DELL POWEREDGE R730 8 BAY TWO E5-2603V3 1.6GHZ 768GB 8 X 600GB 15K SAS H730
|DELL POWEREDGE R730 LFF 8 BAY TWO E5-2680V3 2.5GHZ 256GB 8 X 600GB 15K SAS H330
|DELL POWEREDGE R730 LFF 8 BAY TWO E5-2650V4 2.2GHZ 384GB 2 X 2TB SAS H330
|DELL POWEREDGE R730 8 BAY TWO E5-2640V3 2.6GHZ 192GB 8 X 600GB 15K 12G H730
No Discussions have been posted on this vulnerability.