VID |
26295 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The hotfix (MS07-050, 938127) for 'Remote Code Execution Vulnerability in Vector Markup Language' has not been applied. The Microsoft Windows Vector Markup Language (VML) implementation could allow a remote attacker to execute arbitrary code on the affected host, caused by a buffer overflow vulnerability in the vector graphics link library (vgx.dll). By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment) using Microsoft Internet Explorer, a remote attacker could execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebBrowser control) to crash.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms07-050.mspx http://www.kb.cert.org/vuls/id/468800 http://securitytracker.com/alerts/2007/Aug/1018568.html http://secunia.com/advisories/26409
* Platforms Affected: Microsoft Internet Explorer 5.01 SP4 Microsoft Internet Explorer 6.0 SP1 Microsoft Internet Explorer 7 Microsoft Windows 2000 SP4 Microsoft Windows XP SP2 Microsoft Windows Server 2003 SP2 Microsoft Windows Vista |
Recommendation |
Apply the appropriate patch (938127) for your system, as listed in Microsoft Security Bulletin MS07-050 at http://www.microsoft.com/technet/security/bulletin/ms07-050.mspx
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2007-3032,CVE-2007-3033,CVE-2007-3891 (CVE) |
Related URL |
25287,25304,25306 (SecurityFocus) |
Related URL |
35770,35771,35897 (ISS) |
|