Korean
<< Back
VID 26254
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The hotfix (MS07-004, 929969) for 'Vulnerability in Vector Markup Language' has not been applied. Microsoft Internet Explorer 5.01, 6, and 7 on Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 up to SP1 could allow a remote attacker to execute arbitrary code, caused by a heap-based buffer overflow vulnerability in the Vector Markup Language (VML) implementation (vgx.dll). An attacker could exploit this vulnerability by constructing a specially crafted Web page that could potentially allow remote code execution if a user viewed the Web page. An attacker who successfully exploited this vulnerability could take complete control of an affected system.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.microsoft.com/technet/security/bulletin/ms07-004.mspx
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=462
http://www.kb.cert.org/vuls/id/122084

* Platforms Affected:
Microsoft Windows 2000 Service Pack 4
Microsoft Windows XP Service Pack 2
Microsoft Windows Server 2003 SP1
Recommendation Apply the appropriate patch (929969) for your system, as listed in Microsoft Security Bulletin MS07-004 at http://www.microsoft.com/technet/security/bulletin/ms07-004.mspx

-- OR --

Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2006-5584 (CVE)
Related URL (SecurityFocus)
Related URL 30756,30757 (ISS)