VID |
26485 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The hotfix (MS10-012, 971468) for 'Vulnerabilities in SMB Server Could Allow Remote Code Execution' has not been applied. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms10-012.mspx
* Platforms Affected: Windows 2000 SP4 Windows XP SP2 and SP3 Windows XP x64 SP2 Windows Server 2003 SP2 Windows Server 2003 x64 SP2 Windows Server 2003 SP2 for Itanium Windows Vista, SP1 and SP2 Windows Vista(x64), SP1(x64) and SP2(x64) Windows Server 2008 and SP2 Windows Server 2008(x64) and SP2(x64) Windows Server 2008 and SP2 for Itanium Windows 7 Windows 7(x64) Window Server 2008 R2(x64) Window Server 2008 R2(x64) for Itanium |
Recommendation |
Apply the appropriate patch (971468)for your system, as listed in Microsoft Security Bulletin MS10-009 at http://www.microsoft.com/technet/security/Bulletin/MS10-012.mspx -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2010-0239,CVE-2010-0240,CVE-2010-0241,CVE-2010-0242 (CVE) |
Related URL |
38061,38062,38063,38064 (SecurityFocus) |
Related URL |
(ISS) |
|