Korean
<< Back
VID 26575
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Hotfix (MS11-038, 2476490) for 'Vulnerability in OLE Automation Could Allow Remote Code Execution' has not been applied.
This security update resolves a privately reported vulnerability in Microsoft Windows Object Linking and Embedding (OLE) Automation. The vulnerability could allow remote code execution if a user visits a Web site containing a specially crafted Windows Metafile (WMF) image. In all cases, however, an attacker would have no way to force users to visit such a Web site. Instead, an attacker would have to convince users to visit a malicious Web site, typically by getting them to click a link in an e-mail message or Instant Messenger request.
The security update addresses the vulnerability by correcting the manner in which OLE Automation parses WMF files.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.microsoft.com/technet/security/bulletin/MS11-038.mspx

* Platforms Affected:
Windows XP SP3
Windows XP x64 SP2
Windows Server 2003 SP2
Windows Server 2003 x64SP2
Windows Server 2003 SP2 for Itanium
Windows Vista SP1 and SP2
Windows Vista x64 SP1 and SP2
Windows Server 2008 and SP2
Windows Server 2008 x64 and SP2
Windows Server 2008 SP2 for Itanium
Windows 7 and SP1
Windows 7 x64
Windows Server 2008 R2 x64
Windows Server 2008 R2 for Itanium
Recommendation Apply the appropriate patch (2476490)for your system, as listed in Microsoft Security Bulletin MS11-038 at http://www.microsoft.com/technet/security/Bulletin/MS11-038.mspx
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2011-0658 (CVE)
Related URL 48174 (SecurityFocus)
Related URL (ISS)