Korean
<< Back
VID 26226
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The hotfix (MS06-052, KB919007) for 'Vulnerability in Microsoft PGM' has not been applied. Pragmatic General Multicast (PGM) is only supported when Microsoft Message Queuing (MSMQ) 3.0 is installed. The MSMQ service is not installed by default. Microsoft XP is vulnerable to a arbitrary remote code execution attack, caused by a buffer overflow vulnerability in the Microsoft PGM. By sending a specially crafted multicast message to an affected system, a remote attacker could execute arbitrary code on the affected system.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.microsoft.com/technet/security/bulletin/ms06-052.mspx
http://www.frsirt.com/english/advisories/2006/3563
http://secunia.com/advisories/21851
http://securitytracker.com/alerts/2006/Sep/1016827.html

* Platforms Affected:
Microsoft Windows XP SP2
Recommendation Apply the appropriate patch (KB919007) for your system, as listed in Microsoft Security Bulletin MS06-052 at http://www.microsoft.com/technet/security/bulletin/ms06-052.mspx

-- OR --

Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2006-3443,CVE-2006-3648 (CVE)
Related URL 19375,19384 (SecurityFocus)
Related URL 28009,28011,28012 (ISS)