Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.901169
Kategorie:Windows : Microsoft Bulletins
Titel:Microsoft Windows Address Book Remote Code Execution Vulnerability (2423089)
Zusammenfassung:This host is missing a critical security update according to; Microsoft Bulletin MS10-096.
Beschreibung:Summary:
This host is missing a critical security update according to
Microsoft Bulletin MS10-096.

Vulnerability Insight:
The Address Book (wab.exe) application insecurely loads certain libraries
from the current working directory, which could allow attackers to execute
arbitrary code by tricking a user into opening a vCard file from a network
share.

Vulnerability Impact:
Successful exploitation could allow attackers to execute arbitrary code.

Affected Software/OS:
- Microsoft Windows 7

- Microsoft Windows XP Service Pack 3 and prior

- Microsoft Windows 2003 Service Pack 2 and prior

- Microsoft Windows Vista Service Pack 1/2 and prior

- Microsoft Windows Server 2008 Service Pack 1/2 and prior

Solution:
The vendor has released updates. Please see the references for more information.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2010-3147
Cert/CC Advisory: TA10-348A
http://www.us-cert.gov/cas/techalerts/TA10-348A.html
http://www.exploit-db.com/exploits/14745/
http://www.attackvector.org/new-dll-hijacking-exploits-many/
Microsoft Security Bulletin: MS10-096
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-096
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12352
http://www.securitytracker.com/id?1024878
http://secunia.com/advisories/41050
CopyrightCopyright (C) 2010 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.