Korean
<< Back
VID 26063
Severity 30
Port 139,445
Protocol TCP
Class SMB
Detailed Description The hotfix(Q323172) for the 'Digital Certificate Destruction Vulnerability due to a flaw in Certificate Enrollment Control' has not been applied.
Microsoft Certificate Enrollment Control is an ActiveX control included with all versions of Windows that is used for users to request digital certificates. By design, the control should be able to install new certificates, but should never be able to access certificates that are already on the user's system. However, this restriction could be bypassed through an extremely complex process, due to a flaw in the Windows Certificate Enrollment Control. By creating a malicious web pate, and then hosting it on a web site or sending the page as an HTML mail, a remote attacker can delete specified digital certificates from the target system when viewed. This would result in a denial of service against certain functions and services on the target system.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.microsoft.com/technet/security/bulletin/MS02-048.asp

* Platforms Affected:
Windows 98
Windows 98 Second Edition
Windows Me
Windows NT 4.0 SP 6a and earlier
Windows 2000 SP3 and earlier
Windows XP
Recommendation Apply the appropriate patch for your system, as listed in Microsoft's security bulletin MS02-048 at http://www.microsoft.com/technet/security/bulletin/MS02-048.asp

1. Open the following page :
For Microsoft Windows 98: http://www.microsoft.com/windows98/downloads/contents/WUCritical/q323172/default.asp
For Microsoft Windows 98 Second Edition: http://www.microsoft.com/windows98/downloads/contents/WUCritical/q323172/default.asp
For Microsoft Windows Me: http://download.microsoft.com/download/WINME/PATCH/24421/WINME/EN-US/323172USAM.EXE
For Microsoft Windows NT 4.0: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=41747
For Microsoft Windows NT 4.0, Terminal Server Edition: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=41361
For Microsoft Windows 2000: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=41568
For Microsoft Windows XP: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=41598
For Microsoft Windows XP 64-bit Edition: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=41594
2. Select a different language from the drop-down list and click <Go> button.
3. Click <Download> button to download this patch file.
4. Run this file to install the patch.
5. Restart your system to complete the installation.

-- OR --

Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com .
Windows Update detects what version of Windows you are running and offers the appropriate patch.
---
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0699
http://www.securityfocus.com/bid/5593
http://xforce.iss.net/xforce/xfdb/9982
Related URL CVE-2002-0699 (CVE)
Related URL 5593 (SecurityFocus)
Related URL 9982 (ISS)