VID |
28187 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The Windows host has a VeriSign I-Nav ActiveX control that is vulnerable to a buffer overflow vulnerability. The VeriSign I-Nav (VUpdater.Install) ActiveX control provides support for Internationalized Domain Names in Microsoft Internet Explorer, Outlook and Outlook Express. This control is vulnerable to a buffer overflow vulnerability that arises when processing CAB files. By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), a remote attacker could execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebBrowser control) to crash.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.zerodayinitiative.com/advisories/ZDI-06-014.html http://www.frsirt.com/english/advisories/2006/1763
* Platforms Affected: VeriSign I-Nav ActiveX control Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of the I-Nav ActiveX control, available at http://www.idnnow.com/index.jsp |
Related URL |
CVE-2006-2273 (CVE) |
Related URL |
17939 (SecurityFocus) |
Related URL |
26375 (ISS) |
|