Lucene search

K
openvasCopyright (C) 2003 Jeff AdamsOPENVAS:136141256231011887
HistoryNov 03, 2005 - 12:00 a.m.

Buffer Overflow in Windows Troubleshooter ActiveX Control (826232, MS03-042)

2005-11-0300:00:00
Copyright (C) 2003 Jeff Adams
plugins.openvas.org
10

6.4 Medium

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.966 High

EPSS

Percentile

99.6%

A security vulnerability exists in the Microsoft Local
Troubleshooter ActiveX control in Windows 2000.

# SPDX-FileCopyrightText: 2003 Jeff Adams
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.11887");
  script_version("2024-05-03T15:38:41+0000");
  script_tag(name:"last_modification", value:"2024-05-03 15:38:41 +0000 (Fri, 03 May 2024)");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_cve_id("CVE-2003-0662");
  script_name("Buffer Overflow in Windows Troubleshooter ActiveX Control (826232, MS03-042)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2003 Jeff Adams");
  script_family("Windows : Microsoft Bulletins");
  script_dependencies("secpod_reg_enum.nasl");
  script_mandatory_keys("SMB/registry_enumerated");

  script_tag(name:"summary", value:"A security vulnerability exists in the Microsoft Local
  Troubleshooter ActiveX control in Windows 2000.");

  script_tag(name:"insight", value:"The vulnerability exists because the ActiveX control
  (Tshoot.ocx) contains a buffer overflow.

  To exploit this vulnerability, the attacker would have to create a specially formed HTML based
  e-mail and send it to the user.

  Alternatively an attacker would have to host a malicious Web site that contained a Web page
  designed to exploit this vulnerability.");

  script_tag(name:"impact", value:"This flaw could allow an attacker to run code of their choice on
  a user's system.");

  script_tag(name:"affected", value:"Microsoft Windows 2000.");

  script_tag(name:"solution", value:"The vendor has released updates. Please see the references for
  more information.");

  script_xref(name:"URL", value:"https://learn.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-042");
  script_xref(name:"IAVA", value:"2003-A-0029");

  script_tag(name:"qod_type", value:"registry");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("secpod_reg.inc");

if(hotfix_check_sp(win2k:5) <= 0)
  exit(0);

if(hotfix_missing(name:"KB826232") > 0) {
  security_message(port:0);
  exit(0);
}

exit(99);

6.4 Medium

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.966 High

EPSS

Percentile

99.6%

Related for OPENVAS:136141256231011887