VID |
28182 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The Windows host has an Acer LunchApp ActiveX control that is vulnerable to a command execution vulnerability. The Acer LunchApp ActiveX control is provided by LunchApp.ocx file as shipped with the Acer Aspire 5600 and Acer TravelMate 4150 notebook computers. These Acer notebooks could allow a remote attacker to execute arbitrary commands on the system, caused by the use of the insecure Run() method by the LunchApp.APLunch ActiveX control. By convincing a victim to view an HTML document (web page, HTML email, or email attachment), an attacker could run arbitrary commands with the privileges of the user running IE.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://support.acer-euro.com/drivers/utilities.html#APP http://vuln.sg/acerlunchapp-en.html http://www.frsirt.com/english/advisories/2006/4602 http://secunia.com/advisories/23003/ http://www.kb.cert.org/vuls/id/221700
* Platforms Affected: Acer Aspire 5600 Acer TravelMate 4150 |
Recommendation |
Apply the security patch called Acer Preload Security Patch for Windows XP, available at http://support.acer-euro.com/drivers/utilities.html#APP . This patch unregisters and deletes the LunchApp.ocx file if it is present in the Windows System directory.
As a workaround, disable the Acer LunchApp ActiveX control in Internet Explorer, as listed in the Microsoft Support Document 240797 at http://support.microsoft.com/kb/240797 |
Related URL |
CVE-2006-6121 (CVE) |
Related URL |
21207 (SecurityFocus) |
Related URL |
30417 (ISS) |
|