| VID |
26143 |
| Severity |
40 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The hotfix (KB898458) for 'Vulnerability in Step-by-Step Interactive Training' has not been applied. Microsoft Windows 98, Windows Me, Windows 2000, Windows XP and Windows Server 2003 are vulnerable to a stack-based buffer overflow vulnerability, caused due to a boundary error in the Step-by-Step Interactive Training component when handling bookmark link files. A remote attacker could create a specially-crafted bookmark link file (.cbo, cbl, or .cbm extension) containing an overly long string in the "User" field to overflow a buffer and execute arbitrary code on the system. An attacker could exploit the vulnerability by constructing a malicious bookmark link file that could potentially allow remote code execution if a user visited a malicious Web site or opened a malicious attachment that was provided in an e-mail message. An attacker who successfully exploited this vulnerability could take complete control of an affected system.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms05-031.mspx http://secunia.com/advisories/15669/ http://idefense.com/application/poi/display?id=262&type=vulnerabilities&flashstatus=true
* Platforms Affected: Microsoft Windows 98, Me Microsoft Windows 2000 Service Pack 4 Microsoft Windows XP Service Pack 2 Microsoft Windows Server 2003 Service Pack 1 |
| Recommendation |
Apply the appropriate patch (KB898458) for your system, as listed in Microsoft Security Bulletin MS05-031 at http://www.microsoft.com/technet/security/bulletin/ms05-031.mspx
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch. |
| Related URL |
CVE-2005-1207 (CVE) |
| Related URL |
13950 (SecurityFocus) |
| Related URL |
(ISS) |
|