VID |
26044 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The latest Cumulative Security Update (MS06-076, 923694) for Microsoft Outlook Express has not been applied. Microsoft Outlook Express is an e-mail and newsgroup client shipped with the Microsoft Windows operating system. Microsoft Windows 2000, Windows XP and Windows Server 2003 running Outlook Express versions 5.5 or 6 are vulnerable to a buffer overflow vulnerability, caused by improper bounds checking of Windows Address Book (.wab) files. By creating a malicious .wab file, a remote attacker could overflow a buffer and execute arbitrary code on the system, once the file is open. An attacker could exploit these vulnerabilities by hosting the malicious file on a Web site and then persuading a potential victim to visit the site or sending the file to a potential victim as an email attachment.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms06-076.mspx
* Platforms Affected: Microsoft Outlook Express 5.5 SP2 Microsoft Outlook Express 6.0 Microsoft Outlook Express 6.0 SP1 Microsoft Windows 2000 Service Pack 4 Microsoft Windows XP Service Pack 2 Microsoft Windows Server 2003 SP1 |
Recommendation |
Apply the appropriate patch (923694) for your system, as listed in Microsoft Security Bulletin MS06-076 at http://www.microsoft.com/technet/security/bulletin/ms06-076.mspx
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2006-2386 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
29227 (ISS) |
|