VID |
26635 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The hotfix (MS12-081, 2758857) for 'Vulnerability in Windows File Handling Component Could Allow Remote Code Execution' has not been applied. This security update resolves a privately reported vulnerability in Microsoft Windows.
- Windows Filename Parsing Vulnerability - CVE-2012-4774 A remote code execution vulnerability exists in the way that Microsoft Windows parses filenames. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker could exploit this vulnerability by convincing a user to browse to a file system that contains a file or subfolder with a specially crafted name.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://technet.microsoft.com/en-us/security/Bulletin/MS12-081
* Platforms Affected: Windows XP SP3 Windows XP x64 SP2 Windows Server 2003 SP2 Windows Server 2003 x64 SP2 Windows Server 2003 SP2 for Itanium Windows Vista SP2 Windows Vista x64 SP2 Windows Server 2008 SP2 Windows Server 2008 x64 and SP2 Windows 7 and SP1 Windows 7 x64 and SP1 |
Recommendation |
Apply the appropriate patch (2758857) for your system, as listed in Microsoft Security Bulletin MS12-081 at http://technet.microsoft.com/en-us/security/bulletin/ms12-081 -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2012-4774 (CVE) |
Related URL |
56443 (SecurityFocus) |
Related URL |
(ISS) |
|