Korean
<< Back
VID 28182
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Windows host has an Acer LunchApp ActiveX control that is vulnerable to a command execution vulnerability. The Acer LunchApp ActiveX control is provided by LunchApp.ocx file as shipped with the Acer Aspire 5600 and Acer TravelMate 4150 notebook computers. These Acer notebooks could allow a remote attacker to execute arbitrary commands on the system, caused by the use of the insecure Run() method by the LunchApp.APLunch ActiveX control. By convincing a victim to view an HTML document (web page, HTML email, or email attachment), an attacker could run arbitrary commands with the privileges of the user running IE.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://support.acer-euro.com/drivers/utilities.html#APP
http://vuln.sg/acerlunchapp-en.html
http://www.frsirt.com/english/advisories/2006/4602
http://secunia.com/advisories/23003/
http://www.kb.cert.org/vuls/id/221700

* Platforms Affected:
Acer Aspire 5600
Acer TravelMate 4150
Recommendation Apply the security patch called Acer Preload Security Patch for Windows XP, available at http://support.acer-euro.com/drivers/utilities.html#APP . This patch unregisters and deletes the LunchApp.ocx file if it is present in the Windows System directory.

As a workaround, disable the Acer LunchApp ActiveX control in Internet Explorer, as listed in the Microsoft Support Document 240797 at http://support.microsoft.com/kb/240797
Related URL CVE-2006-6121 (CVE)
Related URL 21207 (SecurityFocus)
Related URL 30417 (ISS)