Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.902112
Kategorie:Windows : Microsoft Bulletins
Titel:Microsoft SMB Client Remote Code Execution Vulnerabilities (978251)
Zusammenfassung:This host is missing a critical security update according to; Microsoft Bulletin MS10-006.
Beschreibung:Summary:
This host is missing a critical security update according to
Microsoft Bulletin MS10-006.

Vulnerability Insight:
The flaws are due to pool corruption error in SMB client implementation. It is
improperly validating fields in the SMB response.

Vulnerability Impact:
Successful exploitation could allow remote attackers to crash an affected
system or execute arbitrary code by tricking a user into visiting a specially
crafted web page.

Affected Software/OS:
- Microsoft Windows 7

- Microsoft Windows 2000 Service Pack 4 and prior

- Microsoft Windows XP Service Pack 3 and prior

- Microsoft Windows 2003 Service Pack 2 and prior

- Microsoft Windows Vista Service Pack 1/2 and prior

- Microsoft Windows Server 2008 Service Pack 1/2 and prior

Solution:
The vendor has released updates. Please see the references for more information.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2010-0017
Cert/CC Advisory: TA10-040A
http://www.us-cert.gov/cas/techalerts/TA10-040A.html
Microsoft Security Bulletin: MS10-006
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-006
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8298
Common Vulnerability Exposure (CVE) ID: CVE-2010-0016
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8278
CopyrightCopyright (C) 2010 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.