VID |
26254 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The hotfix (MS07-004, 929969) for 'Vulnerability in Vector Markup Language' has not been applied. Microsoft Internet Explorer 5.01, 6, and 7 on Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 up to SP1 could allow a remote attacker to execute arbitrary code, caused by a heap-based buffer overflow vulnerability in the Vector Markup Language (VML) implementation (vgx.dll). An attacker could exploit this vulnerability by constructing a specially crafted Web page that could potentially allow remote code execution if a user viewed the Web page. An attacker who successfully exploited this vulnerability could take complete control of an affected system.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms07-004.mspx http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=462 http://www.kb.cert.org/vuls/id/122084
* Platforms Affected: Microsoft Windows 2000 Service Pack 4 Microsoft Windows XP Service Pack 2 Microsoft Windows Server 2003 SP1 |
Recommendation |
Apply the appropriate patch (929969) for your system, as listed in Microsoft Security Bulletin MS07-004 at http://www.microsoft.com/technet/security/bulletin/ms07-004.mspx
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2006-5584 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
30756,30757 (ISS) |
|