VID |
26619 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The Hotfix (MS12-043, 2722479) for 'Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution' has not been applied. A remote code execution vulnerability exists in the way that Microsoft XML Core Services handles objects in memory. The vulnerability could allow remote code execution if a user views a website that contains specially crafted content. In all cases, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these conditions will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://technet.microsoft.com/en-us/security/bulletin/ms12-043
* Platforms Affected: Microsoft Windows XP SP3 Microsoft Windows Server 2003 SP2 Microsoft Windows Vista SP2 Microsoft Windows Server 2008 SP2 Microsoft Windows 7 and SP1 |
Recommendation |
Apply the appropriate patch (2722479) for your system, as listed in Microsoft Security Bulletin MS12-043 at http://technet.microsoft.com/en-us/security/bulletin/ms12-043 -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2012-1889 (CVE) |
Related URL |
53934 (SecurityFocus) |
Related URL |
(ISS) |
|