Korean
<< Back
VID 26635
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The hotfix (MS12-081, 2758857) for 'Vulnerability in Windows File Handling Component Could Allow Remote Code Execution' has not been applied.
This security update resolves a privately reported vulnerability in Microsoft Windows.

- Windows Filename Parsing Vulnerability - CVE-2012-4774
A remote code execution vulnerability exists in the way that Microsoft Windows parses filenames. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker could exploit this vulnerability by convincing a user to browse to a file system that contains a file or subfolder with a specially crafted name.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://technet.microsoft.com/en-us/security/Bulletin/MS12-081

* Platforms Affected:
Windows XP SP3
Windows XP x64 SP2
Windows Server 2003 SP2
Windows Server 2003 x64 SP2
Windows Server 2003 SP2 for Itanium
Windows Vista SP2
Windows Vista x64 SP2
Windows Server 2008 SP2
Windows Server 2008 x64 and SP2
Windows 7 and SP1
Windows 7 x64 and SP1
Recommendation Apply the appropriate patch (2758857) for your system, as listed in Microsoft Security Bulletin MS12-081 at http://technet.microsoft.com/en-us/security/bulletin/ms12-081
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2012-4774 (CVE)
Related URL 56443 (SecurityFocus)
Related URL (ISS)