VID |
26198 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The hotfix (MS06-023, KB917344) for 'Vulnerability in Microsoft Jscript' has not been applied. Microsoft Jscript 5.1, 5.5, and 5.6 on Windows 2000 SP4, and Jscript 5.6 on Windows XP and Windows Server 2003 are vulnerable to a remote code execution attack, caused by memory corruption vulnerability in Microsoft Jscript. By constructing a specially crafted Jscript, a remote attacker could potentially execute arbitrary code if a user visited a Web site or viewed a specially crafted e-mail message. An attacker who successfully exploited this vulnerability could take complete control of an affected system.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms06-023.mspx http://www.kb.cert.org/vuls/id/390044 http://www.us-cert.gov/cas/techalerts/TA06-164A.html http://www.frsirt.com/english/advisories/2006/2321 http://securitytracker.com/id?1016283 http://secunia.com/advisories/20620
* Platforms Affected: Microsoft Jscript 5.1 Microsoft Jscript 5.5 Microsoft Jscript 5.6 Microsoft Windows 2000 SP4 Microsoft Windows XP Any version SP2 Microsoft Windows Server 2003 Any version SP1 |
Recommendation |
Apply the appropriate patch (KB917344) for your system, as listed in Microsoft Security Bulletin MS06-023 at http://www.microsoft.com/technet/security/bulletin/ms06-023.mspx
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2006-2378 (CVE) |
Related URL |
18394 (SecurityFocus) |
Related URL |
26809 (ISS) |
|