Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.901169
Categoría:Windows : Microsoft Bulletins
Título:Microsoft Windows Address Book Remote Code Execution Vulnerability (2423089)
Resumen:This host is missing a critical security update according to; Microsoft Bulletin MS10-096.
Descripción:Summary:
This host is missing a critical security update according to
Microsoft Bulletin MS10-096.

Vulnerability Insight:
The Address Book (wab.exe) application insecurely loads certain libraries
from the current working directory, which could allow attackers to execute
arbitrary code by tricking a user into opening a vCard file from a network
share.

Vulnerability Impact:
Successful exploitation could allow attackers to execute arbitrary code.

Affected Software/OS:
- Microsoft Windows 7

- Microsoft Windows XP Service Pack 3 and prior

- Microsoft Windows 2003 Service Pack 2 and prior

- Microsoft Windows Vista Service Pack 1/2 and prior

- Microsoft Windows Server 2008 Service Pack 1/2 and prior

Solution:
The vendor has released updates. Please see the references for more information.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Referencia Cruzada: BugTraq ID: 42648
Common Vulnerability Exposure (CVE) ID: CVE-2010-3147
Cert/CC Advisory: TA10-348A
http://www.us-cert.gov/cas/techalerts/TA10-348A.html
http://www.exploit-db.com/exploits/14745/
http://www.attackvector.org/new-dll-hijacking-exploits-many/
Microsoft Security Bulletin: MS10-096
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-096
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12352
http://www.securitytracker.com/id?1024878
http://secunia.com/advisories/41050
CopyrightCopyright (C) 2010 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.