VID |
26250 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The hotfix (MS06-074, KB926247) for 'Remote Code Execution Vulnerability in SNMP' has not been applied. Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 up to SP1 are vulnerable to a buffer overflow in the Simple Network Management Protocol (SNMP) service. By sending a specially-crafted SNMP packet to a vulnerable system, a remote attacker could overflow a buffer and execute arbitrary code on the system. The SNMP service is not installed by default.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms06-074.mspx http://www.iss.net/threats/244.html http://www.kb.cert.org/vuls/id/901584
* Platforms Affected: Microsoft Windows 2000 SP4 Microsoft Windows XP SP2 Microsoft Windows Server 2003 SP1 Microsoft Windows Server 2003 SP1 Itanium |
Recommendation |
Apply the appropriate patch (KB926247) for your system, as listed in Microsoft Security Bulletin MS06-074 at http://www.microsoft.com/technet/security/bulletin/ms06-074.mspx
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2006-4704 (CVE) |
Related URL |
20843 (SecurityFocus) |
Related URL |
29915 (ISS) |
|