VID |
26217 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The hotfix (MS06-043, 920214) for 'Vulnerability in Microsoft Windows' has not been applied. Microsoft Windows XP SP2 and Server 2003 SP1 are vulnerable to a buffer overflow vulnerability in the inetcomm.dll file, caused by improper parsing of the MHTML protocol. An attacker could exploit this vulnerability by constructing a specially crafted Web page or HTML e-mail that could potentially lead to remote code execution if a user visited a specially crafted Web site or clicked a link in a specially crafted e-mail message.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms06-043.mspx http://www.securityfocus.com/archive/1/archive/1/435492/100/0/threaded http://www.securityfocus.com/archive/1/435616/100/0/threaded http://www.securityfocus.com/archive/1/435609/100/0/threaded http://www.frsirt.com/english/advisories/2006/2088 http://secunia.com/advisories/20384 http://www.kb.cert.org/vuls/id/891204 http://www.us-cert.gov/cas/techalerts/TA06-220A.html
* Platforms Affected: Microsoft Outlook Express 6.0 Microsoft Windows XP SP2 Microsoft Windows Server 2003 SP1 |
Recommendation |
Apply the appropriate patch (920214) for your system, as listed in Microsoft Security Bulletin MS06-043 at http://www.microsoft.com/technet/security/bulletin/ms06-043.mspx
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2006-2766 (CVE) |
Related URL |
18198 (SecurityFocus) |
Related URL |
26810,28019 (ISS) |
|