![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.902159 |
Category: | Windows : Microsoft Bulletins |
Title: | Microsoft VBScript Scripting Engine Remote Code Execution Vulnerability (980232) |
Summary: | This host is missing a critical security update according to; Microsoft Bulletin MS10-022. |
Description: | Summary: This host is missing a critical security update according to Microsoft Bulletin MS10-022. Vulnerability Insight: The flaw exists in the way 'VBScript' interacts with Windows Help files when using Internet Explorer. If a malicious Web site displayed a specially crafted dialog box and a user pressed the F1 key, it allows arbitrary code to be executed in the security context of the currently logged-on user. Vulnerability Impact: Successful exploitation could allow remote attackers to crash an affected system or execute arbitrary code by tricking a user into visiting a specially crafted web page. Affected Software/OS: - Microsoft Windows 7 - Microsoft Windows 2000 Service Pack 4 and prior - Microsoft Windows XP Service Pack 3 and prior - Microsoft Windows 2003 Service Pack 2 and prior - Microsoft Windows Vista Service Pack 1/2 and prior - Microsoft Windows Server 2008 Service Pack 1/2 and prior Solution: The vendor has released updates. Please see the references for more information. CVSS Score: 7.6 CVSS Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2010-0483 BugTraq ID: 38463 http://www.securityfocus.com/bid/38463 Cert/CC Advisory: TA10-103A http://www.us-cert.gov/cas/techalerts/TA10-103A.html CERT/CC vulnerability note: VU#612021 http://www.kb.cert.org/vuls/id/612021 http://isec.pl/vulnerabilities/isec-0027-msgbox-helpfile-ie.txt http://isec.pl/vulnerabilities10.html http://www.computerworld.com/s/article/9163298/New_zero_day_involves_IE_puts_Windows_XP_users_at_risk http://www.theregister.co.uk/2010/03/01/ie_code_execution_bug/ https://www.metasploit.com/svn/framework3/trunk/modules/exploits/windows/browser/ie_winhlp32.rb Microsoft Security Bulletin: MS10-022 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-022 http://www.osvdb.org/62632 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7170 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8654 http://securitytracker.com/id?1023668 http://secunia.com/advisories/38727 http://www.vupen.com/english/advisories/2010/0485 XForce ISS Database: ms-win-msgbox-code-execution(56558) https://exchange.xforce.ibmcloud.com/vulnerabilities/56558 |
Copyright | Copyright (C) 2010 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |