Korean
<< Back
VID 26231
Severity 30
Port 139,445
Protocol TCP
Class SMB
Detailed Description The hotfix (MS06-055, KB925486) for 'Remote Code Execution Vulnerability in VML' has not been applied. Microsoft Outlook and Internet Explorer 6.x could allow a remote attacker to execute arbitrary code, caused by a stack-based buffer overflow in the Vector Markup Language (VML) handling routine. By creating a malicious HTML document containing specially-crafted VML, a remote attacker could potentially execute arbitrary code if a user visited a Web site or viewed a specially crafted e-mail message. An attacker who successfully exploited this vulnerability could take complete control of an affected system.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.microsoft.com/technet/security/bulletin/ms06-055.mspx
http://support.microsoft.com/kb/925486
http://www.us-cert.gov/cas/techalerts/TA06-262A.html
http://www.kb.cert.org/vuls/id/416092
http://www.securityfocus.com/archive/1/archive/1/446528/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/446523/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/446505/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/446378/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/447070/100/0/threaded
http://www.osvdb.org/28946
http://www.frsirt.com/english/advisories/2006/3679
http://sunbeltblog.blogspot.com/2006/09/seen-in-wild-zero-day-exploit-being.html
http://securitytracker.com/id?1016879
http://secunia.com/advisories/21989
http://blogs.securiteam.com/index.php/archives/624

* Platforms Affected:
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6.x
Microsoft Windows 2000 SP4
Microsoft Windows XP SP2
Microsoft Windows Server 2003
Recommendation Apply the appropriate patch (KB925486) for your system, as listed in Microsoft Security Bulletin MS06-055 at http://www.microsoft.com/technet/security/bulletin/ms06-055.mspx

-- OR --

Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2006-0032 (CVE)
Related URL 19927 (SecurityFocus)
Related URL 28651 (ISS)