VID |
26484 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The hotfix (MS10-009, 974145) for 'Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution' has not been applied. The most severe of these vulnerabilities could allow remote code execution if specially crafted packets are sent to a computer with IPv6 enabled. An attacker could try to exploit the vulnerability by creating specially crafted ICMPv6 packets and sending the packets to a system with IPv6 enabled. This vulnerability may only be exploited if the attacker is on-link..
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms10-009.mspx
* Platforms Affected: Windows Vista, SP1 and SP2 Windows Server 2008 and SP2 |
Recommendation |
Apply the appropriate patch (974145)for your system, as listed in Microsoft Security Bulletin MS10-009 at http://www.microsoft.com/technet/security/Bulletin/MS10-009.mspx -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch |
Related URL |
CVE-2009-2570,CVE-2009-3735,CVE-2010-0252 (CVE) |
Related URL |
34766,38045,38060,38066,38067 (SecurityFocus) |
Related URL |
(ISS) |
|