| VID |
26084 |
| Severity |
30 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The Hotfix (KB841872) for the 'Code Execution Vulnerability in POSIX' has not been applied. This vulnerability is a Privilege Elevation Vulnerability, caused by an unchecked buffer in the POSIX subsystem. You can run applications that are created for the Portable Operating System Interface for UNIX (POSIX) standard under Windows NT 4.0 and Windows 2000. The operating systems provide support for nonnative applications by emulating the environments in which they are designed to be processed. This support is provided through environment subsystems. By first logging on to the target system and then running a specially-designed program that could attempt to exploit the vulnerability, an attacker could take complete control of an affected system, including installing programs; viewing, changing, or deleting data; or creating new accounts that have full privileges.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms04-020.mspx
* Platforms Affected: Microsoft Windows NT 4.0 Service Pack 6a Microsoft Windows 2000 SP2 ~ SP4 |
| Recommendation |
Apply the appropriate patch for your system, as listed in Microsoft's security bulletin MS04-020, http://www.microsoft.com/technet/security/bulletin/ms04-020.mspx
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch. |
| Related URL |
CVE-2004-0213 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|