VID |
26209 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The hotfix (915384) for 'Remote Code Execution Vulnerabilities in Microsoft Office Filters' has not been applied. Microsoft Office 2000, 2002, and 2003, and Microsoft Project 2000, and 2002 could allow a remote attacker to execute arbitrary code, caused by multiple buffer overflow vulnerabilities that exist in the Microsoft Office filters. By creating a specially-crafted PNG or GIF file, a remote attacker could overflow a buffer and execute arbitrary code on the system, once the file is open. An attacker could exploit these vulnerabilities by hosting the malicious file on a Web site and then persuading a potential victim to visit the site or sending the file to a potential victim as an email attachment.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms06-039.mspx
* Platforms Affected: Microsoft Office 2000 SP1, SP2, SP3 Microsoft Office XP SP3 Microsoft Office 2003 SP1, SP2 Microsoft Project 2000 Microsoft Project 2002 Microsoft Works 8.0, 8.5 Microsoft Works Suite 2000 through to 2006 Microsoft Windows Any version |
Recommendation |
Apply the appropriate patch (915384) for your system, as listed in Microsoft Security Bulletin MS06-039 at http://www.microsoft.com/technet/security/bulletin/ms06-039.mspx |
Related URL |
CVE-2005-4131,CVE-2006-0028,CVE-2006-0029,CVE-2006-0030,CVE-2006-0031,CVE-2006-0009 (CVE) |
Related URL |
15780,17000 (SecurityFocus) |
Related URL |
23537,25009,25225,25227,25228,25229 (ISS) |
|