Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.901165
Kategorie:Windows : Microsoft Bulletins
Titel:Windows Common Control Library Remote Code Execution Vulnerability (2296011)
Zusammenfassung:This host is missing a critical security update according to; Microsoft Bulletin MS10-081.
Beschreibung:Summary:
This host is missing a critical security update according to
Microsoft Bulletin MS10-081.

Vulnerability Insight:
The flaw is caused by a heap overflow error in the Windows common control
library 'Comctl32.dll' when handling certain messages while rendering scalable
vector graphics passed from a third-party scalable vector graphics viewer,
which could allow attackers to execute arbitrary code by tricking into
rendering malformed scalable vector graphics via a third-party application.

Vulnerability Impact:
Successful exploitation will allow the attacker to execute arbitrary code on
the targeted system.

Affected Software/OS:
- Microsoft Windows XP Service Pack 3 and prior

- Microsoft Windows 2K3 Service Pack 2 and prior

- Microsoft Windows Vista Service Pack 2 and prior

- Microsoft Windows Server 2008 Service Pack 2 and prior

- Microsoft Windows 7

Solution:
The vendor has released updates. Please see the references for more information.

CVSS Score:
7.6

CVSS Vector:
AV:N/AC:H/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2010-2746
Cert/CC Advisory: TA10-285A
http://www.us-cert.gov/cas/techalerts/TA10-285A.html
Microsoft Security Bulletin: MS10-081
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-081
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7272
http://www.securitytracker.com/id?1024549
CopyrightCopyright (C) 2010 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.