Korean
<< Back
VID 26308
Severity 30
Port 139,445
Protocol TCP
Class SMB
Detailed Description The hotfix (MS07-061, KB943460) for 'Remote Code Execution Vulnerability in Windows URI' has not been applied. Microsoft Windows XP SP1 and SP2, and Server 2003 up to SP2 could allow a remote attacker to execute arbitrary commands on the system, caused due to an input validation error within the Windows shell (shell32.dll) when handling specially-crafted URIs with registered URI handlers (e.g. "mailto", "news", "nntp", "snews", "telnet", and "http"). By persuading a victim to visit a specially-crafted URI containing a "%" character and ending with a certain extension (e.g. ".bat" or ".cmd"), a remote attacker could exploit this vulnerability to inject and execute arbitrary shell commands on the system.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.microsoft.com/technet/security/Bulletin/MS07-061.mspx
http://www.kb.cert.org/vuls/id/403150
http://secunia.com/advisories/26201/

* Platforms Affected:
Microsoft Windows XP SP2
Microsoft Windows Server 2003 SP2
Microsoft Windows Server 2003 x64 Edition SP2
Recommendation Apply the appropriate patch (KB943460) for your system, as listed in Microsoft Security Bulletin MS07-061 at http://www.microsoft.com/technet/security/bulletin/ms07-061.mspx

-- OR --

Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2007-2228 (CVE)
Related URL 25974 (SecurityFocus)
Related URL 36803,36807 (ISS)