VID |
26164 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The hotfix (KB905495) for 'Vulnerability in the Windows FTP Client' has not been applied. The Windows FTP Client in Microsoft Internet Explorer version 6.0 could allow a remote attacker to modify the intended destination location for a file transfer when a client has manually chosen to transfer a file by using FTP, caused by improper validation of file names that are received from FTP servers. An attacker who exploited this vulnerability could save files to specific locations on an affected system. These files could allow other attacks. For example, an attacker could save an executable file in the ¡°Startup¡± folder. Then, the transferred file would run the next time the user logs on.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms05-044.mspx http://archives.neohapsis.com/archives/bugtraq/2004-12/0479.html
* Platforms Affected: Microsoft Internet Explorer 6.0 SP1 Microsoft Windows 2000 SP4 Microsoft Windows XP SP1 Microsoft Windows 2003 Server (Itanium) Microsoft Windows Server 2003 |
Recommendation |
Apply the appropriate patch (KB905495) for your system, as listed in Microsoft Security Bulletin MS05-044 at http://www.microsoft.com/technet/security/bulletin/ms05-044.mspx
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2005-1984 (CVE) |
Related URL |
14514 (SecurityFocus) |
Related URL |
21604,21605 (ISS) |
|