Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.902159
Kategorie:Windows : Microsoft Bulletins
Titel:Microsoft VBScript Scripting Engine Remote Code Execution Vulnerability (980232)
Zusammenfassung:This host is missing a critical security update according to; Microsoft Bulletin MS10-022.
Beschreibung:Summary:
This host is missing a critical security update according to
Microsoft Bulletin MS10-022.

Vulnerability Insight:
The flaw exists in the way 'VBScript' interacts with Windows Help files
when using Internet Explorer. If a malicious Web site displayed a specially
crafted dialog box and a user pressed the F1 key, it allows arbitrary code
to be executed in the security context of the currently logged-on user.

Vulnerability Impact:
Successful exploitation could allow remote attackers to crash an affected
system or execute arbitrary code by tricking a user into visiting a specially
crafted web page.

Affected Software/OS:
- Microsoft Windows 7

- Microsoft Windows 2000 Service Pack 4 and prior

- Microsoft Windows XP Service Pack 3 and prior

- Microsoft Windows 2003 Service Pack 2 and prior

- Microsoft Windows Vista Service Pack 1/2 and prior

- Microsoft Windows Server 2008 Service Pack 1/2 and prior

Solution:
The vendor has released updates. Please see the references for more information.

CVSS Score:
7.6

CVSS Vector:
AV:N/AC:H/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2010-0483
BugTraq ID: 38463
http://www.securityfocus.com/bid/38463
Cert/CC Advisory: TA10-103A
http://www.us-cert.gov/cas/techalerts/TA10-103A.html
CERT/CC vulnerability note: VU#612021
http://www.kb.cert.org/vuls/id/612021
http://isec.pl/vulnerabilities/isec-0027-msgbox-helpfile-ie.txt
http://isec.pl/vulnerabilities10.html
http://www.computerworld.com/s/article/9163298/New_zero_day_involves_IE_puts_Windows_XP_users_at_risk
http://www.theregister.co.uk/2010/03/01/ie_code_execution_bug/
https://www.metasploit.com/svn/framework3/trunk/modules/exploits/windows/browser/ie_winhlp32.rb
Microsoft Security Bulletin: MS10-022
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-022
http://www.osvdb.org/62632
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7170
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8654
http://securitytracker.com/id?1023668
http://secunia.com/advisories/38727
http://www.vupen.com/english/advisories/2010/0485
XForce ISS Database: ms-win-msgbox-code-execution(56558)
https://exchange.xforce.ibmcloud.com/vulnerabilities/56558
CopyrightCopyright (C) 2010 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.