VID |
26308 |
Severity |
30 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The hotfix (MS07-061, KB943460) for 'Remote Code Execution Vulnerability in Windows URI' has not been applied. Microsoft Windows XP SP1 and SP2, and Server 2003 up to SP2 could allow a remote attacker to execute arbitrary commands on the system, caused due to an input validation error within the Windows shell (shell32.dll) when handling specially-crafted URIs with registered URI handlers (e.g. "mailto", "news", "nntp", "snews", "telnet", and "http"). By persuading a victim to visit a specially-crafted URI containing a "%" character and ending with a certain extension (e.g. ".bat" or ".cmd"), a remote attacker could exploit this vulnerability to inject and execute arbitrary shell commands on the system.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/Bulletin/MS07-061.mspx http://www.kb.cert.org/vuls/id/403150 http://secunia.com/advisories/26201/
* Platforms Affected: Microsoft Windows XP SP2 Microsoft Windows Server 2003 SP2 Microsoft Windows Server 2003 x64 Edition SP2 |
Recommendation |
Apply the appropriate patch (KB943460) for your system, as listed in Microsoft Security Bulletin MS07-061 at http://www.microsoft.com/technet/security/bulletin/ms07-061.mspx
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2007-2228 (CVE) |
Related URL |
25974 (SecurityFocus) |
Related URL |
36803,36807 (ISS) |
|