VID |
26582 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The hotfix (MS11-063, 2567680) for 'Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege' has not been applied. This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms11-063.mspx
* Platforms Affected: Windows XP SP3 Windows XP x64 SP3 Windows Server 2003 x64 SP2 Windows Server 2003 SP2 for Itanium Windows Vista x64 SP1 and SP2 Windows Server 2008 x64 and SP2 Windows 7 x64 and SP1 Windows Server 2008 R2 x64 and SP1 Windows Server 2008 R2 for Itanium and SP1 |
Recommendation |
Apply the appropriate patch (2567680)for your system, as listed in Microsoft Security Bulletin MS11-063 at http://www.microsoft.com/technet/security/bulletin/ms11-063.mspx -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2011-1967 (CVE) |
Related URL |
48992 (SecurityFocus) |
Related URL |
(ISS) |
|