VID |
26404 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The Hotfix (MS08-078, 960714) for the Dec. 2008 Patch for Internet Explorer' has not been applied. This patch resolves newly discovered public vulnerability: The remote version of IE is vulnerable to a memory corruption which may allow an attacker to execute arbitrary code on the remote host.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/Bulletin/MS08-078.mspx
* Platforms Affected: In Microsoft Internet Explorer 5.01 or 6 Microsoft Windows 2000 SP4
In Microsoft Internet Explorer 6 Microsoft Windows XP SP2 or SP3 Microsoft Windows XP Professional x64 or SP2 Microsoft Windows Server 2003 SP1 or SP2 Microsoft Windows Server 2003 x64 or SP2 Microsoft Windows Server 2003 for Itanium-based System SP1 or SP2
In Microsoft Internet Explorer 7 Microsoft Windows XP SP2 or SP3 Microsoft Windows XP Professional x64 or SP2 Microsoft Windows Server 2003 SP1 or SP2 Microsoft Windows Server 2003 x64 or SP2 Microsoft Windows Server 2003 for Itanium-based System SP1 or SP2 Microsoft Windows Vista or SP1 Microsoft Windows Vista x64 or SP1 Microsoft Windows Server 2008 Any Version |
Recommendation |
Apply the appropriate patch (960714) for your system, as listed in Microsoft Security Bulletin 08-078 at http://www.microsoft.com/technet/security/bulletin/ms08-078.mspx
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2008-4258,CVE-2008-4259,CVE-2008-4260,CVE-2008-4261 (CVE) |
Related URL |
32586,32593,32595,32596 (SecurityFocus) |
Related URL |
(ISS) |
|