VID |
26595 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The Hotfix (MS11-075, 2623699) for 'Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution' has not been applied. This security update resolves a privately reported vulnerability in the Microsoft Active Accessibility component. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, the Microsoft Active Accessibility component could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. The security update addresses the vulnerability by correcting the manner in which the Microsoft Active Accessibility component loads external libraries.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://technet.microsoft.com/en-us/security/bulletin/ms11-075
* Platforms Affected: Windows XP SP3 Windows XP x64 SP2 Windows Server 2003 SP2 Windows Server 2003 x64SP2 Windows Server 2003 SP2 for Itanium Windows Vista SP1 and SP2 Windows Vista x64 SP1 and SP2 Windows Server 2008 and SP2 Windows Server 2008 x64 and SP2 Windows Server 2008 SP2 for Itanium Windows 7 and SP1 Windows 7 x64 Windows Server 2008 R2 x64 Windows Server 2008 R2 for Itanium |
Recommendation |
Apply the appropriate patch (2623699)for your system, as listed in Microsoft Security Bulletin MS11-075 at http://technet.microsoft.com/en-us/security/bulletin/ms11-075 -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2011-1247 (CVE) |
Related URL |
49976 (SecurityFocus) |
Related URL |
(ISS) |
|