Korean
<< Back
VID 26143
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The hotfix (KB898458) for 'Vulnerability in Step-by-Step Interactive Training' has not been applied. Microsoft Windows 98, Windows Me, Windows 2000, Windows XP and Windows Server 2003 are vulnerable to a stack-based buffer overflow vulnerability, caused due to a boundary error in the Step-by-Step Interactive Training component when handling bookmark link files. A remote attacker could create a specially-crafted bookmark link file (.cbo, cbl, or .cbm extension) containing an overly long string in the "User" field to overflow a buffer and execute arbitrary code on the system.
An attacker could exploit the vulnerability by constructing a malicious bookmark link file that could potentially allow remote code execution if a user visited a malicious Web site or opened a malicious attachment that was provided in an e-mail message. An attacker who successfully exploited this vulnerability could take complete control of an affected system.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.microsoft.com/technet/security/bulletin/ms05-031.mspx
http://secunia.com/advisories/15669/
http://idefense.com/application/poi/display?id=262&type=vulnerabilities&flashstatus=true

* Platforms Affected:
Microsoft Windows 98, Me
Microsoft Windows 2000 Service Pack 4
Microsoft Windows XP Service Pack 2
Microsoft Windows Server 2003 Service Pack 1
Recommendation Apply the appropriate patch (KB898458) for your system, as listed in Microsoft Security Bulletin MS05-031 at http://www.microsoft.com/technet/security/bulletin/ms05-031.mspx

-- OR --

Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2005-1207 (CVE)
Related URL 13950 (SecurityFocus)
Related URL (ISS)