VID |
26462 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
Cumulative Security Update for Internet Explorer (974455) has not been applied. This Hotfix includes multiple vulnerabilities. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Vulnerabilities: - Data Stream Header Corruption Vulnerability(CVE-2009-1547) A remote code execution vulnerability exists in the way that Internet Explorer processes data stream headers in specific situations. - HTML Component Handling Vulnerability(CVE-2009-2529) A remote code execution vulnerability exists in the way that Internet Explorer handles argument validation of a variable in specific situations. - Uninitialized Memory Corruption Vulnerability(CVE-2009-2530, CVE-2009-2531) A remote code execution vulnerability exists in the way Internet Explorer accesses an object that has not been correctly initialized or has been deleted.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/MS09-054.mspx
* Platforms Affected: - Internet Explorer 5.01 and 6 sp1 Microsoft Windows 2000 SP4 - Internet Explorer 6 Microsoft Windows XP SP2 and SP3 - Internet Explorer 7 Microsoft Windows XP SP2 and SP3 Windows Server 2003 SP2 Windows Vista and SP1 and SP2 Windows Server 2008 and SP2 - Internet Explorer 8 Microsoft Windows XP SP2 and SP3 Windows Server 2003 SP2 Windows Vista and SP1 and SP2 Windows Server 2008 and SP2 Windows 7 Windows Server 2008 R2 |
Recommendation |
Apply the appropriate patch (974455)for your system, as listed in Microsoft Security Bulletin MS09-054 at http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2009-2527 (CVE) |
Related URL |
36644 (SecurityFocus) |
Related URL |
(ISS) |
|