Audit Report
Site report for Winxp
Audited on December 11 2011
Reported on December 11 2011
This report represents a security audit performed by Nexpose from Rapid7 LLC. It contains confidential information about the state of your network. Access to this information by unauthorized personnel may allow them to compromise your network.
Site Name |
Start Time |
End Time |
Total Time |
Status |
---|---|---|---|---|
Winxp |
December 11, 2011 02:45, CET |
December 11, 2011 02:47, CET |
1 minutes |
Success |
There is not enough historical data to display risk trend.
The audit was performed on one system which was found to be active and was scanned.
![]() |
There were 12 vulnerabilities found during this scan. Of these, 9 were critical vulnerabilities. Critical vulnerabilities require immediate attention. They are relatively easy for attackers to exploit and may provide them with full control of the affected systems. 2 vulnerabilities were severe. Severe vulnerabilities are often harder to exploit and may not provide the same access to affected systems. There was one moderate vulnerability discovered. These often provide information to attackers that may assist them in mounting subsequent attacks on your network. These should also be fixed in a timely manner, but are not as urgent as the other vulnerabilities.
![]() |
![]() |
There were 3 occurrences of the windows-hotfix-ms08-067 vulnerability, making it the most common vulnerability. There were 14 vulnerabilities in the Windows category, making it the most common vulnerability category.
![]() |
The windows-hotfix-ms08-067 vulnerability poses the highest risk to the organization with a risk score of 675. Vulnerability risk scores are calculated by looking at the likelihood of attack and impact, based upon CVSS metrics. The impact and likelihood are then multiplied by the number of instances of the vulnerability to come up with the final risk score.
One operating system was identified during this scan.
There were 4 services found to be running during this scan.
![]() |
The CIFS, CIFS Name Service, DCE Endpoint Resolution and NTP services were found on 1 systems, making them the most common services.
Node |
Operating System |
Risk |
Aliases |
---|---|---|---|
192.168.56.103 |
Microsoft Windows XP |
7,514 |
|
Certain versions of Microsoft Windows are vulnerable to a remote buffer overflow which could compromise a target machine. A specially crafted packet could be used in a call to the NetPathCanonicalize RPC routine in the Server Service, whereby an attacker could execute code under SYSTEM level access.
Affected Nodes: |
Additional Information: |
---|---|
192.168.56.103 |
Got vulnerable string result |
Source |
Reference |
---|---|
BID |
19409 ( http://www.securityfocus.com/bid/19409 ) |
CERT |
TA06-220A ( http://www.cert.org/advisories/TA06-220A.html ) |
CERT-VN |
650769 ( http://www.kb.cert.org/vuls/id/650769 ) |
CVE |
CVE-2006-3439 ( http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3439 ) |
MS |
MS06-040 ( http://www.microsoft.com/technet/security/bulletin/MS06-040.mspx ) |
MSKB |
921883 ( http://support.microsoft.com/default.aspx?scid=kb;EN-US;921883 ) |
OVAL |
OVAL492 ( http://oval.mitre.org/oval/definitions/data/OVAL492.html ) |
SANS-06 |
W4 ( http://www.sans.org/top20/2006/#w4 ) |
SANS-07 |
S2 ( http://www.sans.org/top20/2007/#s2 ) |
SECUNIA |
21388 ( http://secunia.com/advisories/21388/ ) |
XF |
ms-server-service-bo(28002) ( http://xforce.iss.net/xforce/xfdb/28002 ) |
Microsoft Windows 2000 Professional, Microsoft Windows 2000 Datacenter Server, Microsoft Windows 2000 Server, Microsoft Windows 2000 Advanced Server
Install Microsoft service pack Windows 2000 Service Pack 4
Download and apply the upgrade from: http://support.microsoft.com/sp ( http://support.microsoft.com/sp )
Microsoft Windows 2000 Professional SP4, Microsoft Windows 2000 Datacenter Server SP4, Microsoft Windows 2000 Server SP4, Microsoft Windows 2000 Advanced Server SP4
Download and install Microsoft patch WinDOWS2000-KB921883-x86-ENU.EXE
Download and apply the patch from: http://download.microsoft.com/download/9/0/b/90b8dbba-09c1-4b27-b0c4-0cc13706823a/Windows2000-KB921883-x86-ENU.EXE ( http://download.microsoft.com/download/9/0/b/90b8dbba-09c1-4b27-b0c4-0cc13706823a/Windows2000-KB921883-x86-ENU.EXE )
Microsoft Windows XP Home Edition, Microsoft Windows XP Professional, Microsoft Windows XP Tablet PC Edition, Microsoft Windows XP Media Center Edition
Install Microsoft service pack Windows XP Service Pack 1
Download and apply the upgrade from: http://support.microsoft.com/sp ( http://support.microsoft.com/sp )
Microsoft Windows XP Home Edition SP1 OR SP2, Microsoft Windows XP Professional SP1 OR SP2
Download and install Microsoft patch WindowSXP-KB921883-x86-ENU.EXE
Download and apply the patch from: http://download.microsoft.com/download/c/2/b/c2b41862-1113-4e40-a81a-d6971733e361/WindowsXP-KB921883-x86-ENU.exe ( http://download.microsoft.com/download/c/2/b/c2b41862-1113-4e40-a81a-d6971733e361/WindowsXP-KB921883-x86-ENU.exe )
Microsoft Windows Server 2003, Web Edition < SP1 OR SP1, Microsoft Windows Server 2003, Enterprise Edition < SP1 OR SP1, Microsoft Windows Server 2003, Datacenter Edition < SP1 OR SP1, Microsoft Windows Server 2003, Standard Edition < SP1 OR SP1, Microsoft Windows Small Business Server 2003 < SP1 OR SP1
Download and install Microsoft patch WindowsServer2003-KB921883-x86-ENU.EXE
Download and apply the patch from: http://download.microsoft.com/download/6/e/e/6ee2a18d-b3a7-457a-af39-fb687fd6aa91/WindowsServer2003-KB921883-x86-ENU.exe ( http://download.microsoft.com/download/6/e/e/6ee2a18d-b3a7-457a-af39-fb687fd6aa91/WindowsServer2003-KB921883-x86-ENU.exe )
This security update resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter.
Affected Nodes: |
Additional Information: |
---|---|
192.168.56.103 |
Vulnerable OS: Microsoft Windows XP Based on the result of the "Microsoft Server Service / CanonicalizePathName() Remote Code Execution Vulnerability" test, this node is vulnerable to this additional issue as well. |
192.168.56.103:139 |
Running vulnerable CIFS service. Vulnerable OS: Microsoft Windows XP Received vulnerable status reply |
192.168.56.103:445 |
Running vulnerable CIFS service. Vulnerable OS: Microsoft Windows XP Received vulnerable status reply |
Source |
Reference |
---|---|
BID |
31874 ( http://www.securityfocus.com/bid/31874 ) |
CERT |
TA08-297A ( http://www.cert.org/advisories/TA08-297A.html ) |
CERT |
TA09-088A ( http://www.cert.org/advisories/TA09-088A.html ) |
CERT-VN |
827267 ( http://www.kb.cert.org/vuls/id/827267 ) |
CVE |
CVE-2008-4250 ( http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-4250 ) |
MS |
MS08-067 ( http://www.microsoft.com/technet/security/bulletin/MS08-067.mspx ) |
MSKB |
958644 ( http://support.microsoft.com/default.aspx?scid=kb;EN-US;958644 ) |
OVAL |
OVAL6093 ( http://oval.mitre.org/oval/definitions/data/OVAL6093.html ) |
SECUNIA |
32326 ( http://secunia.com/advisories/32326/ ) |
URL |
http://blogs.msdn.com/sdl/archive/2008/10/22/ms08-067.aspx ( http://blogs.msdn.com/sdl/archive/2008/10/22/ms08-067.aspx ) |
URL |
http://blogs.technet.com/msrc/archive/2008/10/23/ms08-067-released.aspx ( http://blogs.technet.com/msrc/archive/2008/10/23/ms08-067-released.aspx ) |
URL |
http://blogs.technet.com/swi/archive/2008/10/23/More-detail-about-MS08-067.aspx ( http://blogs.technet.com/swi/archive/2008/10/23/More-detail-about-MS08-067.aspx ) |
XF |
win-server-rpc-code-execution(46040) ( http://xforce.iss.net/xforce/xfdb/46040 ) |
Microsoft Windows 2000 SP4 (x86), Microsoft Windows 2000 Professional SP4 (x86), Microsoft Windows 2000 Server SP4 (x86), Microsoft Windows 2000 Advanced Server SP4 (x86), Microsoft Windows 2000 Datacenter Server SP4 (x86)
Download and install Microsoft patch Windows2000-KB958644-x86-ENU.EXE (618024 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windows2000-kb958644-x86-enu_32416827ab7de148e5e7998e6e1f4c3b16fa4719.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windows2000-kb958644-x86-enu_32416827ab7de148e5e7998e6e1f4c3b16fa4719.exe )
Microsoft Windows Server 2003 SP2 OR SP1 (x86), Microsoft Windows Server 2003, Standard Edition SP2 OR SP1 (x86), Microsoft Windows Server 2003, Enterprise Edition SP2 OR SP1 (x86), Microsoft Windows Server 2003, Datacenter Edition SP2 OR SP1 (x86), Microsoft Windows Server 2003, Web Edition SP2 OR SP1 (x86), Microsoft Windows Small Business Server 2003 SP2 OR SP1 (x86)
Download and install Microsoft patch WindowsServer2003-KB958644-x86-ENU.exe (702840 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windowsserver2003-kb958644-x86-enu_af4987620549ae4174e45ec5aa872f4a352f34c1.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windowsserver2003-kb958644-x86-enu_af4987620549ae4174e45ec5aa872f4a352f34c1.exe )
Microsoft Windows XP Professional SP3 OR SP2 (x86), Microsoft Windows XP Home SP3 OR SP2 (x86)
Download and install Microsoft patch WindowsXP-KB958644-x86-ENU.exe (648560 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windowsxp-kb958644-x86-enu_5c135a8dae5721849430afe27af255f83e64f62b.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windowsxp-kb958644-x86-enu_5c135a8dae5721849430afe27af255f83e64f62b.exe )
Microsoft Windows XP Professional SP2 OR SP1 (x86_64)
Download and install Microsoft patch WindowsServer2003.WindowsXP-KB958644-x64-ENU.exe (1288568 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windowsserver2003.windowsxp-kb958644-x64-enu_75717882c206870bdbaec8e606c588853fb8e34c.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windowsserver2003.windowsxp-kb958644-x64-enu_75717882c206870bdbaec8e606c588853fb8e34c.exe )
Microsoft Windows Server 2003 SP2 OR SP1 (x86_64), Microsoft Windows Server 2003, Standard Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2003, Enterprise Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2003, Datacenter Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2003, Web Edition SP2 OR SP1 (x86_64), Microsoft Windows Small Business Server 2003 SP2 OR SP1 (x86_64)
Download and install Microsoft patch WindowsServer2003.WindowsXP-KB958644-x64-ENU.exe (1288568 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windowsserver2003.windowsxp-kb958644-x64-enu_75717882c206870bdbaec8e606c588853fb8e34c.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windowsserver2003.windowsxp-kb958644-x64-enu_75717882c206870bdbaec8e606c588853fb8e34c.exe )
Microsoft Windows Server 2003 SP2 OR SP1 (ia64), Microsoft Windows Server 2003, Standard Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2003, Enterprise Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2003, Datacenter Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2003, Web Edition SP2 OR SP1 (ia64), Microsoft Windows Small Business Server 2003 SP2 OR SP1 (ia64)
Download and install Microsoft patch WindowsServer2003-KB958644-ia64-ENU.exe (1778040 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windowsserver2003-kb958644-ia64-enu_5d8f2d2bcc621f453035d2d9eabde032b0be36c3.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windowsserver2003-kb958644-ia64-enu_5d8f2d2bcc621f453035d2d9eabde032b0be36c3.exe )
Microsoft Windows Server 2008 SP1 (x86_64), Microsoft Windows Server 2008 Enterprise Edition SP1 (x86_64), Microsoft Windows Server 2008 Standard Edition SP1 (x86_64), Microsoft Windows Server 2008 Datacenter Edition SP1 (x86_64), Microsoft Windows Server 2008 HPC Edition SP1 (x86_64), Microsoft Windows Server 2008 Web Edition SP1 (x86_64), Microsoft Windows Server 2008 Storage Edition SP1 (x86_64), Microsoft Windows Small Business Server 2008 SP1 (x86_64), Microsoft Windows Essential Business Server 2008 SP1 (x86_64)
Download and install Microsoft patch Windows6.0-KB958644-x64.cab (538665 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windows6.0-kb958644-x64_6156746e22baf9bec4c4ac7aa8355b1795c25be0.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windows6.0-kb958644-x64_6156746e22baf9bec4c4ac7aa8355b1795c25be0.cab )
Microsoft Windows Server 2008 SP1 (x86), Microsoft Windows Server 2008 Enterprise Edition SP1 (x86), Microsoft Windows Server 2008 Standard Edition SP1 (x86), Microsoft Windows Server 2008 Datacenter Edition SP1 (x86), Microsoft Windows Server 2008 HPC Edition SP1 (x86), Microsoft Windows Server 2008 Web Edition SP1 (x86), Microsoft Windows Server 2008 Storage Edition SP1 (x86), Microsoft Windows Small Business Server 2008 SP1 (x86), Microsoft Windows Essential Business Server 2008 SP1 (x86)
Download and install Microsoft patch Windows6.0-KB958644-x86.cab (265099 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windows6.0-kb958644-x86_ecdee104d41f6f93e455b8b5dcc349a99f58fe77.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windows6.0-kb958644-x86_ecdee104d41f6f93e455b8b5dcc349a99f58fe77.cab )
Microsoft Windows Server 2008 SP1 (ia64), Microsoft Windows Server 2008 Enterprise Edition SP1 (ia64), Microsoft Windows Server 2008 Standard Edition SP1 (ia64), Microsoft Windows Server 2008 Datacenter Edition SP1 (ia64), Microsoft Windows Server 2008 HPC Edition SP1 (ia64), Microsoft Windows Server 2008 Web Edition SP1 (ia64), Microsoft Windows Server 2008 Storage Edition SP1 (ia64), Microsoft Windows Small Business Server 2008 SP1 (ia64), Microsoft Windows Essential Business Server 2008 SP1 (ia64)
Download and install Microsoft patch Windows6.0-KB958644-ia64.cab (567175 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windows6.0-kb958644-ia64_8a5f04cb6a4d61b6fb565bd32471869b27f24100.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windows6.0-kb958644-ia64_8a5f04cb6a4d61b6fb565bd32471869b27f24100.cab )
Microsoft Windows Vista < SP1 (x86), Microsoft Windows Vista Home, Basic Edition < SP1 (x86), Microsoft Windows Vista Home, Basic N Edition < SP1 (x86), Microsoft Windows Vista Home, Premium Edition < SP1 (x86), Microsoft Windows Vista Ultimate Edition < SP1 (x86), Microsoft Windows Vista Enterprise Edition < SP1 (x86), Microsoft Windows Vista Business Edition < SP1 (x86), Microsoft Windows Vista Business N Edition < SP1 (x86), Microsoft Windows Vista Starter Edition < SP1 (x86)
Download and install Microsoft patch Windows6.0-KB958644-x86.cab (265099 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windows6.0-kb958644-x86_ecdee104d41f6f93e455b8b5dcc349a99f58fe77.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windows6.0-kb958644-x86_ecdee104d41f6f93e455b8b5dcc349a99f58fe77.cab )
Microsoft Windows Vista < SP1 (x86_64), Microsoft Windows Vista Home, Basic Edition < SP1 (x86_64), Microsoft Windows Vista Home, Basic N Edition < SP1 (x86_64), Microsoft Windows Vista Home, Premium Edition < SP1 (x86_64), Microsoft Windows Vista Ultimate Edition < SP1 (x86_64), Microsoft Windows Vista Enterprise Edition < SP1 (x86_64), Microsoft Windows Vista Business Edition < SP1 (x86_64), Microsoft Windows Vista Business N Edition < SP1 (x86_64), Microsoft Windows Vista Starter Edition < SP1 (x86_64)
Download and install Microsoft patch Windows6.0-KB958644-x64.cab (538665 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windows6.0-kb958644-x64_6156746e22baf9bec4c4ac7aa8355b1795c25be0.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/10/windows6.0-kb958644-x64_6156746e22baf9bec4c4ac7aa8355b1795c25be0.cab )
This security update resolves several privately reported vulnerabilities in Microsoft Server Message Block (SMB) Protocol. The vulnerabilities could allow remote code execution on affected systems. An attacker who successfully exploited these vulnerabilities could install programs; view, change, or delete data; or create new accounts with full user rights. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed.
Affected Nodes: |
Additional Information: |
---|---|
192.168.56.103:139 |
Vulnerable OS: Microsoft Windows XP \BROWSER: WriteAndX succeeded with offset 77 |
192.168.56.103:445 |
Vulnerable OS: Microsoft Windows XP \BROWSER: WriteAndX succeeded with offset 77 |
Source |
Reference |
---|---|
BID |
31179 ( http://www.securityfocus.com/bid/31179 ) |
BID |
33121 ( http://www.securityfocus.com/bid/33121 ) |
BID |
33122 ( http://www.securityfocus.com/bid/33122 ) |
CERT |
TA09-013A ( http://www.cert.org/advisories/TA09-013A.html ) |
CVE |
CVE-2008-4114 ( http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-4114 ) |
CVE |
CVE-2008-4834 ( http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-4834 ) |
CVE |
CVE-2008-4835 ( http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-4835 ) |
MS |
MS09-001 ( http://www.microsoft.com/technet/security/bulletin/MS09-001.mspx ) |
MSKB |
958687 ( http://support.microsoft.com/default.aspx?scid=kb;EN-US;958687 ) |
OVAL |
OVAL5248 ( http://oval.mitre.org/oval/definitions/data/OVAL5248.html ) |
OVAL |
OVAL5262 ( http://oval.mitre.org/oval/definitions/data/OVAL5262.html ) |
OVAL |
OVAL5863 ( http://oval.mitre.org/oval/definitions/data/OVAL5863.html ) |
OVAL |
OVAL6044 ( http://oval.mitre.org/oval/definitions/data/OVAL6044.html ) |
SECUNIA |
31883 ( http://secunia.com/advisories/31883/ ) |
URL |
http://www.vallejo.cc/proyectos/vista_SMB_write_DoS.htm ( http://www.vallejo.cc/proyectos/vista_SMB_write_DoS.htm ) |
URL |
http://www.zerodayinitiative.com/advisories/ZDI-09-001/ ( http://www.zerodayinitiative.com/advisories/ZDI-09-001/ ) |
URL |
http://www.zerodayinitiative.com/advisories/ZDI-09-002/ ( http://www.zerodayinitiative.com/advisories/ZDI-09-002/ ) |
XF |
win-writeandx-dos(45146) ( http://xforce.iss.net/xforce/xfdb/45146 ) |
Microsoft Windows 2000 SP4 (x86), Microsoft Windows 2000 Professional SP4 (x86), Microsoft Windows 2000 Server SP4 (x86), Microsoft Windows 2000 Advanced Server SP4 (x86), Microsoft Windows 2000 Datacenter Server SP4 (x86)
Download and install Microsoft patch Windows2000-KB958687-x86-ENU.EXE (617512 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windows2000-kb958687-x86-enu_f0ce8f2df0b10e58fb8c5ee278153eae03ad4ac6.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windows2000-kb958687-x86-enu_f0ce8f2df0b10e58fb8c5ee278153eae03ad4ac6.exe )
Microsoft Windows XP Professional SP2 OR SP1 (x86_64)
Download and install Microsoft patch WindowsServer2003.WindowsXP-KB958687-x64-ENU.exe (1237880 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windowsserver2003.windowsxp-kb958687-x64-enu_bd4afc8de96367934e54e496a4dd029933a2140f.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windowsserver2003.windowsxp-kb958687-x64-enu_bd4afc8de96367934e54e496a4dd029933a2140f.exe )
Microsoft Windows Server 2003 SP2 OR SP1 (ia64), Microsoft Windows Server 2003, Standard Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2003, Enterprise Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2003, Datacenter Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2003, Web Edition SP2 OR SP1 (ia64), Microsoft Windows Small Business Server 2003 SP2 OR SP1 (ia64)
Download and install Microsoft patch WindowsServer2003-KB958687-ia64-ENU.exe (1691512 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windowsserver2003-kb958687-ia64-enu_a4d695fccfc7fc0071240d49035fbc9e6fbb16df.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windowsserver2003-kb958687-ia64-enu_a4d695fccfc7fc0071240d49035fbc9e6fbb16df.exe )
Microsoft Windows XP Professional SP3 OR SP2 (x86), Microsoft Windows XP Home SP3 OR SP2 (x86)
Download and install Microsoft patch WindowsXP-KB958687-x86-ENU.exe (658288 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windowsxp-kb958687-x86-enu_a9b85264e9b75e552ae10cd212937b8686a96833.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windowsxp-kb958687-x86-enu_a9b85264e9b75e552ae10cd212937b8686a96833.exe )
Microsoft Windows Server 2003 SP2 OR SP1 (x86), Microsoft Windows Server 2003, Standard Edition SP2 OR SP1 (x86), Microsoft Windows Server 2003, Enterprise Edition SP2 OR SP1 (x86), Microsoft Windows Server 2003, Datacenter Edition SP2 OR SP1 (x86), Microsoft Windows Server 2003, Web Edition SP2 OR SP1 (x86), Microsoft Windows Small Business Server 2003 SP2 OR SP1 (x86)
Download and install Microsoft patch WindowsServer2003-KB958687-x86-ENU.exe (736632 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windowsserver2003-kb958687-x86-enu_7769ec8bf8869acd01fb8f9f63d79c23afbad5c6.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windowsserver2003-kb958687-x86-enu_7769ec8bf8869acd01fb8f9f63d79c23afbad5c6.exe )
Microsoft Windows Server 2003 SP2 OR SP1 (x86_64), Microsoft Windows Server 2003, Standard Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2003, Enterprise Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2003, Datacenter Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2003, Web Edition SP2 OR SP1 (x86_64), Microsoft Windows Small Business Server 2003 SP2 OR SP1 (x86_64)
Download and install Microsoft patch WindowsServer2003.WindowsXP-KB958687-x64-ENU.exe (1237880 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windowsserver2003.windowsxp-kb958687-x64-enu_bd4afc8de96367934e54e496a4dd029933a2140f.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windowsserver2003.windowsxp-kb958687-x64-enu_bd4afc8de96367934e54e496a4dd029933a2140f.exe )
Microsoft Windows Server 2008 SP1 (x86_64), Microsoft Windows Server 2008 Enterprise Edition SP1 (x86_64), Microsoft Windows Server 2008 Standard Edition SP1 (x86_64), Microsoft Windows Server 2008 Datacenter Edition SP1 (x86_64), Microsoft Windows Server 2008 HPC Edition SP1 (x86_64), Microsoft Windows Server 2008 Web Edition SP1 (x86_64), Microsoft Windows Server 2008 Storage Edition SP1 (x86_64), Microsoft Windows Small Business Server 2008 SP1 (x86_64), Microsoft Windows Essential Business Server 2008 SP1 (x86_64)
Download and install Microsoft patch Windows6.0-KB958687-x64.cab (352831 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windows6.0-kb958687-x64_9403e23fd26952e2a4381732cddab933ea23318a.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windows6.0-kb958687-x64_9403e23fd26952e2a4381732cddab933ea23318a.cab )
Microsoft Windows Server 2008 SP1 (ia64), Microsoft Windows Server 2008 Enterprise Edition SP1 (ia64), Microsoft Windows Server 2008 Standard Edition SP1 (ia64), Microsoft Windows Server 2008 Datacenter Edition SP1 (ia64), Microsoft Windows Server 2008 HPC Edition SP1 (ia64), Microsoft Windows Server 2008 Web Edition SP1 (ia64), Microsoft Windows Server 2008 Storage Edition SP1 (ia64), Microsoft Windows Small Business Server 2008 SP1 (ia64), Microsoft Windows Essential Business Server 2008 SP1 (ia64)
Download and install Microsoft patch Windows6.0-KB958687-ia64.cab (435851 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windows6.0-kb958687-ia64_370558be1a03d8288e0f17af53fb019576316cc4.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windows6.0-kb958687-ia64_370558be1a03d8288e0f17af53fb019576316cc4.cab )
Microsoft Windows Server 2008 SP1 (x86), Microsoft Windows Server 2008 Enterprise Edition SP1 (x86), Microsoft Windows Server 2008 Standard Edition SP1 (x86), Microsoft Windows Server 2008 Datacenter Edition SP1 (x86), Microsoft Windows Server 2008 HPC Edition SP1 (x86), Microsoft Windows Server 2008 Web Edition SP1 (x86), Microsoft Windows Server 2008 Storage Edition SP1 (x86), Microsoft Windows Small Business Server 2008 SP1 (x86), Microsoft Windows Essential Business Server 2008 SP1 (x86)
Download and install Microsoft patch Windows6.0-KB958687-x86.cab (216319 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windows6.0-kb958687-x86_48df8df9513e517d7db0a4a75ed2b260c5b7acbf.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windows6.0-kb958687-x86_48df8df9513e517d7db0a4a75ed2b260c5b7acbf.cab )
Microsoft Windows Vista < SP1 (x86), Microsoft Windows Vista Home, Basic Edition < SP1 (x86), Microsoft Windows Vista Home, Basic N Edition < SP1 (x86), Microsoft Windows Vista Home, Premium Edition < SP1 (x86), Microsoft Windows Vista Ultimate Edition < SP1 (x86), Microsoft Windows Vista Enterprise Edition < SP1 (x86), Microsoft Windows Vista Business Edition < SP1 (x86), Microsoft Windows Vista Business N Edition < SP1 (x86), Microsoft Windows Vista Starter Edition < SP1 (x86)
Download and install Microsoft patch Windows6.0-KB958687-x86.cab (216319 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windows6.0-kb958687-x86_48df8df9513e517d7db0a4a75ed2b260c5b7acbf.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windows6.0-kb958687-x86_48df8df9513e517d7db0a4a75ed2b260c5b7acbf.cab )
Microsoft Windows Vista < SP1 (x86_64), Microsoft Windows Vista Home, Basic Edition < SP1 (x86_64), Microsoft Windows Vista Home, Basic N Edition < SP1 (x86_64), Microsoft Windows Vista Home, Premium Edition < SP1 (x86_64), Microsoft Windows Vista Ultimate Edition < SP1 (x86_64), Microsoft Windows Vista Enterprise Edition < SP1 (x86_64), Microsoft Windows Vista Business Edition < SP1 (x86_64), Microsoft Windows Vista Business N Edition < SP1 (x86_64), Microsoft Windows Vista Starter Edition < SP1 (x86_64)
Download and install Microsoft patch Windows6.0-KB958687-x64.cab (352831 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windows6.0-kb958687-x64_9403e23fd26952e2a4381732cddab933ea23318a.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2008/12/windows6.0-kb958687-x64_9403e23fd26952e2a4381732cddab933ea23318a.cab )
This security update resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities.
Affected Nodes: |
Additional Information: |
---|---|
192.168.56.103:139 |
Running vulnerable CIFS service. Vulnerable OS: Microsoft Windows XP Based on the result of the "MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution" test, this node is vulnerable to this additional issue as well. |
192.168.56.103:445 |
Running vulnerable CIFS service. Vulnerable OS: Microsoft Windows XP Based on the result of the "MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution" test, this node is vulnerable to this additional issue as well. |
Source |
Reference |
---|---|
CERT |
TA10-040A ( http://www.cert.org/advisories/TA10-040A.html ) |
CVE |
CVE-2010-0020 ( http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0020 ) |
CVE |
CVE-2010-0021 ( http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0021 ) |
CVE |
CVE-2010-0022 ( http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0022 ) |
CVE |
CVE-2010-0231 ( http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0231 ) |
MS |
MS10-012 ( http://www.microsoft.com/technet/security/bulletin/MS10-012.mspx ) |
MSKB |
971468 ( http://support.microsoft.com/default.aspx?scid=kb;EN-US;971468 ) |
OVAL |
OVAL7751 ( http://oval.mitre.org/oval/definitions/data/OVAL7751.html ) |
OVAL |
OVAL8314 ( http://oval.mitre.org/oval/definitions/data/OVAL8314.html ) |
OVAL |
OVAL8438 ( http://oval.mitre.org/oval/definitions/data/OVAL8438.html ) |
OVAL |
OVAL8524 ( http://oval.mitre.org/oval/definitions/data/OVAL8524.html ) |
Microsoft Windows 2000 SP4 (x86), Microsoft Windows 2000 Professional SP4 (x86), Microsoft Windows 2000 Server SP4 (x86), Microsoft Windows 2000 Advanced Server SP4 (x86), Microsoft Windows 2000 Datacenter Server SP4 (x86)
Download and install Microsoft patch Windows2000-KB971468-x86-ENU.EXE (621304 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows2000-kb971468-x86-enu_d951943f14a5e6e52fbbbed11ae55882c685795c.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows2000-kb971468-x86-enu_d951943f14a5e6e52fbbbed11ae55882c685795c.exe )
Microsoft Windows 7 < SP1 (x86_64), Microsoft Windows 7 Home, Basic Edition < SP1 (x86_64), Microsoft Windows 7 Home, Basic N Edition < SP1 (x86_64), Microsoft Windows 7 Home, Premium Edition < SP1 (x86_64), Microsoft Windows 7 Home, Premium N Edition < SP1 (x86_64), Microsoft Windows 7 Ultimate Edition < SP1 (x86_64), Microsoft Windows 7 Ultimate N Edition < SP1 (x86_64), Microsoft Windows 7 Enterprise Edition < SP1 (x86_64), Microsoft Windows 7 Enterprise N Edition < SP1 (x86_64), Microsoft Windows 7 Professional Edition < SP1 (x86_64), Microsoft Windows 7 Starter Edition < SP1 (x86_64), Microsoft Windows 7 Starter N Edition < SP1 (x86_64)
Download and install Microsoft patch Windows6.1-KB971468-x64.cab (312331 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows6.1-kb971468-x64_3a3cb2d4ce0f6bb55955bb8098a998b3f125ee49.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows6.1-kb971468-x64_3a3cb2d4ce0f6bb55955bb8098a998b3f125ee49.cab )
Microsoft Windows Server 2008 SP2 OR SP1 (ia64), Microsoft Windows Server 2008 Enterprise Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2008 Standard Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2008 Datacenter Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2008 HPC Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2008 Web Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2008 Storage Edition SP2 OR SP1 (ia64), Microsoft Windows Small Business Server 2008 SP2 OR SP1 (ia64), Microsoft Windows Essential Business Server 2008 SP2 OR SP1 (ia64)
Download and install Microsoft patch Windows6.0-KB971468-ia64.cab (625509 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows6.0-kb971468-ia64_128eb8cad7194b012b81e9b1755bd35a3b46fab4.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows6.0-kb971468-ia64_128eb8cad7194b012b81e9b1755bd35a3b46fab4.cab )
Microsoft Windows Server 2003 SP2 (x86_64), Microsoft Windows Server 2003, Standard Edition SP2 (x86_64), Microsoft Windows Server 2003, Enterprise Edition SP2 (x86_64), Microsoft Windows Server 2003, Datacenter Edition SP2 (x86_64), Microsoft Windows Server 2003, Web Edition SP2 (x86_64), Microsoft Windows Small Business Server 2003 SP2 (x86_64)
Download and install Microsoft patch WindowsServer2003.WindowsXP-KB971468-x64-ENU.exe (1026944 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windowsserver2003.windowsxp-kb971468-x64-enu_8ea00e574a923da8a3aa9205a07780ed0a8741fa.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windowsserver2003.windowsxp-kb971468-x64-enu_8ea00e574a923da8a3aa9205a07780ed0a8741fa.exe )
Microsoft Windows Server 2008 R2 < SP1 (ia64), Microsoft Windows Server 2008 R2, Enterprise Edition < SP1 (ia64), Microsoft Windows Server 2008 R2, Standard Edition < SP1 (ia64), Microsoft Windows Server 2008 R2, Datacenter Edition < SP1 (ia64), Microsoft Windows Server 2008 R2, Web Edition < SP1 (ia64)
Download and install Microsoft patch Windows6.1-KB971468-ia64.cab (580941 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows6.1-kb971468-ia64_414bf40b7690407c9ec9586ac8de40ff824e53a9.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows6.1-kb971468-ia64_414bf40b7690407c9ec9586ac8de40ff824e53a9.cab )
Microsoft Windows Server 2008 R2 < SP1 (x86_64), Microsoft Windows Server 2008 R2, Enterprise Edition < SP1 (x86_64), Microsoft Windows Server 2008 R2, Standard Edition < SP1 (x86_64), Microsoft Windows Server 2008 R2, Datacenter Edition < SP1 (x86_64), Microsoft Windows Server 2008 R2, Web Edition < SP1 (x86_64)
Download and install Microsoft patch Windows6.1-KB971468-x64.cab (312331 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows6.1-kb971468-x64_3a3cb2d4ce0f6bb55955bb8098a998b3f125ee49.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows6.1-kb971468-x64_3a3cb2d4ce0f6bb55955bb8098a998b3f125ee49.cab )
Microsoft Windows Server 2003 SP2 (x86), Microsoft Windows Server 2003, Standard Edition SP2 (x86), Microsoft Windows Server 2003, Enterprise Edition SP2 (x86), Microsoft Windows Server 2003, Datacenter Edition SP2 (x86), Microsoft Windows Server 2003, Web Edition SP2 (x86), Microsoft Windows Small Business Server 2003 SP2 (x86)
Download and install Microsoft patch WindowsServer2003-KB971468-x86-ENU.exe (681856 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windowsserver2003-kb971468-x86-enu_b6dcb60d113c4affd98b5bae0dfd1f5a785ae64d.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windowsserver2003-kb971468-x86-enu_b6dcb60d113c4affd98b5bae0dfd1f5a785ae64d.exe )
Microsoft Windows Server 2003 SP2 (ia64), Microsoft Windows Server 2003, Standard Edition SP2 (ia64), Microsoft Windows Server 2003, Enterprise Edition SP2 (ia64), Microsoft Windows Server 2003, Datacenter Edition SP2 (ia64), Microsoft Windows Server 2003, Web Edition SP2 (ia64), Microsoft Windows Small Business Server 2003 SP2 (ia64)
Download and install Microsoft patch WindowsServer2003-KB971468-ia64-ENU.exe (1589632 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windowsserver2003-kb971468-ia64-enu_faece6ff07ec2a029b74f49a959f1510eb38f3e7.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windowsserver2003-kb971468-ia64-enu_faece6ff07ec2a029b74f49a959f1510eb38f3e7.exe )
Microsoft Windows 7 < SP1 (x86), Microsoft Windows 7 Home, Basic Edition < SP1 (x86), Microsoft Windows 7 Home, Basic N Edition < SP1 (x86), Microsoft Windows 7 Home, Premium Edition < SP1 (x86), Microsoft Windows 7 Home, Premium N Edition < SP1 (x86), Microsoft Windows 7 Ultimate Edition < SP1 (x86), Microsoft Windows 7 Ultimate N Edition < SP1 (x86), Microsoft Windows 7 Enterprise Edition < SP1 (x86), Microsoft Windows 7 Enterprise N Edition < SP1 (x86), Microsoft Windows 7 Professional Edition < SP1 (x86), Microsoft Windows 7 Starter Edition < SP1 (x86), Microsoft Windows 7 Starter N Edition < SP1 (x86)
Download and install Microsoft patch Windows6.1-KB971468-x86.cab (224255 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows6.1-kb971468-x86_79bba3989c41d43fce69d5d04709f061c3c6f5f5.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows6.1-kb971468-x86_79bba3989c41d43fce69d5d04709f061c3c6f5f5.cab )
Microsoft Windows XP Professional SP3 OR SP2 (x86), Microsoft Windows XP Home SP3 OR SP2 (x86)
Download and install Microsoft patch WindowsXP-KB971468-x86-ENU.exe (664952 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windowsxp-kb971468-x86-enu_68d7899c8b8462219daf40f02c6fb9f362b1ee6b.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windowsxp-kb971468-x86-enu_68d7899c8b8462219daf40f02c6fb9f362b1ee6b.exe )
Microsoft Windows Vista SP2 OR < SP1 OR SP1 (x86), Microsoft Windows Vista Home, Basic Edition SP2 OR < SP1 OR SP1 (x86), Microsoft Windows Vista Home, Basic N Edition SP2 OR < SP1 OR SP1 (x86), Microsoft Windows Vista Home, Premium Edition SP2 OR < SP1 OR SP1 (x86), Microsoft Windows Vista Ultimate Edition SP2 OR < SP1 OR SP1 (x86), Microsoft Windows Vista Enterprise Edition SP2 OR < SP1 OR SP1 (x86), Microsoft Windows Vista Business Edition SP2 OR < SP1 OR SP1 (x86), Microsoft Windows Vista Business N Edition SP2 OR < SP1 OR SP1 (x86), Microsoft Windows Vista Starter Edition SP2 OR < SP1 OR SP1 (x86)
Download and install Microsoft patch Windows6.0-KB971468-x86.cab (319207 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows6.0-kb971468-x86_673ca9ff1fae6a26038f2e8764d07033c451de06.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows6.0-kb971468-x86_673ca9ff1fae6a26038f2e8764d07033c451de06.cab )
Microsoft Windows Server 2008 SP2 OR SP1 (x86_64), Microsoft Windows Server 2008 Enterprise Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2008 Standard Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2008 Datacenter Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2008 HPC Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2008 Web Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2008 Storage Edition SP2 OR SP1 (x86_64), Microsoft Windows Small Business Server 2008 SP2 OR SP1 (x86_64), Microsoft Windows Essential Business Server 2008 SP2 OR SP1 (x86_64)
Download and install Microsoft patch Windows6.0-KB971468-x64.cab (595103 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows6.0-kb971468-x64_b33a54f7e4f6f3f8664b5f240ab148f770a28660.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows6.0-kb971468-x64_b33a54f7e4f6f3f8664b5f240ab148f770a28660.cab )
Microsoft Windows XP Professional SP2 (x86_64)
Download and install Microsoft patch WindowsServer2003.WindowsXP-KB971468-x64-ENU.exe (1026944 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windowsserver2003.windowsxp-kb971468-x64-enu_8ea00e574a923da8a3aa9205a07780ed0a8741fa.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windowsserver2003.windowsxp-kb971468-x64-enu_8ea00e574a923da8a3aa9205a07780ed0a8741fa.exe )
Microsoft Windows Server 2008 SP2 OR SP1 (x86), Microsoft Windows Server 2008 Enterprise Edition SP2 OR SP1 (x86), Microsoft Windows Server 2008 Standard Edition SP2 OR SP1 (x86), Microsoft Windows Server 2008 Datacenter Edition SP2 OR SP1 (x86), Microsoft Windows Server 2008 HPC Edition SP2 OR SP1 (x86), Microsoft Windows Server 2008 Web Edition SP2 OR SP1 (x86), Microsoft Windows Server 2008 Storage Edition SP2 OR SP1 (x86), Microsoft Windows Small Business Server 2008 SP2 OR SP1 (x86), Microsoft Windows Essential Business Server 2008 SP2 OR SP1 (x86)
Download and install Microsoft patch Windows6.0-KB971468-x86.cab (319207 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows6.0-kb971468-x86_673ca9ff1fae6a26038f2e8764d07033c451de06.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows6.0-kb971468-x86_673ca9ff1fae6a26038f2e8764d07033c451de06.cab )
Microsoft Windows Vista SP2 OR < SP1 OR SP1 (x86_64), Microsoft Windows Vista Home, Basic Edition SP2 OR < SP1 OR SP1 (x86_64), Microsoft Windows Vista Home, Basic N Edition SP2 OR < SP1 OR SP1 (x86_64), Microsoft Windows Vista Home, Premium Edition SP2 OR < SP1 OR SP1 (x86_64), Microsoft Windows Vista Ultimate Edition SP2 OR < SP1 OR SP1 (x86_64), Microsoft Windows Vista Enterprise Edition SP2 OR < SP1 OR SP1 (x86_64), Microsoft Windows Vista Business Edition SP2 OR < SP1 OR SP1 (x86_64), Microsoft Windows Vista Business N Edition SP2 OR < SP1 OR SP1 (x86_64), Microsoft Windows Vista Starter Edition SP2 OR < SP1 OR SP1 (x86_64)
Download and install Microsoft patch Windows6.0-KB971468-x64.cab (595103 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows6.0-kb971468-x64_b33a54f7e4f6f3f8664b5f240ab148f770a28660.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows6.0-kb971468-x64_b33a54f7e4f6f3f8664b5f240ab148f770a28660.cab )
Microsoft Windows 2000 SP4 (x86), Microsoft Windows 2000 Professional SP4 (x86), Microsoft Windows 2000 Server SP4 (x86), Microsoft Windows 2000 Advanced Server SP4 (x86), Microsoft Windows 2000 Datacenter Server SP4 (x86)
Download and install Microsoft patch Windows2000-KB971468-x86-ENU.EXE (621304 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows2000-kb971468-x86-enu_d951943f14a5e6e52fbbbed11ae55882c685795c.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/01/windows2000-kb971468-x86-enu_d951943f14a5e6e52fbbbed11ae55882c685795c.exe )
This security update resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities.
Affected Nodes: |
Additional Information: |
---|---|
192.168.56.103:139 |
Running vulnerable CIFS service. Vulnerable OS: Microsoft Windows XP Based on the result of the "MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution" test, this node is vulnerable to this additional issue as well. |
192.168.56.103:445 |
Running vulnerable CIFS service. Vulnerable OS: Microsoft Windows XP Based on the result of the "MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution" test, this node is vulnerable to this additional issue as well. |
Source |
Reference |
---|---|
CERT |
TA10-222A ( http://www.cert.org/advisories/TA10-222A.html ) |
CVE |
CVE-2010-2550 ( http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2550 ) |
CVE |
CVE-2010-2551 ( http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2551 ) |
CVE |
CVE-2010-2552 ( http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2552 ) |
MS |
MS10-054 ( http://www.microsoft.com/technet/security/bulletin/MS10-054.mspx ) |
MSKB |
982214 ( http://support.microsoft.com/default.aspx?scid=kb;EN-US;982214 ) |
OVAL |
OVAL11106 ( http://oval.mitre.org/oval/definitions/data/OVAL11106.html ) |
OVAL |
OVAL12015 ( http://oval.mitre.org/oval/definitions/data/OVAL12015.html ) |
OVAL |
OVAL12072 ( http://oval.mitre.org/oval/definitions/data/OVAL12072.html ) |
Microsoft Windows Server 2003, Datacenter Edition SP2 (ia64), Microsoft Windows Server 2003 SP2 (ia64), Microsoft Windows Server 2003, Standard Edition SP2 (ia64), Microsoft Windows Server 2003, Enterprise Edition SP2 (ia64), Microsoft Windows Server 2003, Web Edition SP2 (ia64), Microsoft Windows Small Business Server 2003 SP2 (ia64)
Download and install Microsoft patch windowsserver2003-kb982214-ia64-enu.exe (1592192 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windowsserver2003-kb982214-ia64-enu_d986a271296ea77588377f911eb9e9f47c5c65cd.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windowsserver2003-kb982214-ia64-enu_d986a271296ea77588377f911eb9e9f47c5c65cd.exe )
Microsoft Windows Server 2003, Datacenter Edition SP2 (x86_64), Microsoft Windows Server 2003 SP2 (x86_64), Microsoft Windows Server 2003, Standard Edition SP2 (x86_64), Microsoft Windows Server 2003, Enterprise Edition SP2 (x86_64), Microsoft Windows Server 2003, Web Edition SP2 (x86_64), Microsoft Windows Small Business Server 2003 SP2 (x86_64)
Download and install Microsoft patch windowsserver2003.windowsxp-kb982214-x64-enu.exe (1027968 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windowsserver2003.windowsxp-kb982214-x64-enu_3780ab4068c4715ca93c4d5e4d9d4dbf9bbb6bc3.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windowsserver2003.windowsxp-kb982214-x64-enu_3780ab4068c4715ca93c4d5e4d9d4dbf9bbb6bc3.exe )
Microsoft Windows Server 2003, Datacenter Edition SP2 (x86), Microsoft Windows Server 2003 SP2 (x86), Microsoft Windows Server 2003, Standard Edition SP2 (x86), Microsoft Windows Server 2003, Enterprise Edition SP2 (x86), Microsoft Windows Server 2003, Web Edition SP2 (x86), Microsoft Windows Small Business Server 2003 SP2 (x86)
Download and install Microsoft patch windowsserver2003-kb982214-x86-enu.exe (682880 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windowsserver2003-kb982214-x86-enu_40e37ace02116c2baf27c14c7e3d1883887707e6.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windowsserver2003-kb982214-x86-enu_40e37ace02116c2baf27c14c7e3d1883887707e6.exe )
Microsoft Windows Server 2008 R2 < SP1 (ia64), Microsoft Windows Server 2008 R2, Enterprise Edition < SP1 (ia64), Microsoft Windows Server 2008 R2, Standard Edition < SP1 (ia64), Microsoft Windows Server 2008 R2, Datacenter Edition < SP1 (ia64), Microsoft Windows Server 2008 R2, Web Edition < SP1 (ia64)
Download and install Microsoft patch windows6.1-kb982214-ia64.cab (874695 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windows6.1-kb982214-ia64_4e43dff8c379c89082305f797ad47c973fb24669.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windows6.1-kb982214-ia64_4e43dff8c379c89082305f797ad47c973fb24669.cab )
Microsoft Windows 7 < SP1 (x86_64), Microsoft Windows 7 Home, Basic Edition < SP1 (x86_64), Microsoft Windows 7 Home, Basic N Edition < SP1 (x86_64), Microsoft Windows 7 Home, Premium Edition < SP1 (x86_64), Microsoft Windows 7 Home, Premium N Edition < SP1 (x86_64), Microsoft Windows 7 Ultimate Edition < SP1 (x86_64), Microsoft Windows 7 Ultimate N Edition < SP1 (x86_64), Microsoft Windows 7 Enterprise Edition < SP1 (x86_64), Microsoft Windows 7 Enterprise N Edition < SP1 (x86_64), Microsoft Windows 7 Professional Edition < SP1 (x86_64), Microsoft Windows 7 Starter Edition < SP1 (x86_64), Microsoft Windows 7 Starter N Edition < SP1 (x86_64)
Download and install Microsoft patch windows6.1-kb982214-x64.cab (472691 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windows6.1-kb982214-x64_5e0e4bbc550c76a3f19bd8a62946e34a709e77ba.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windows6.1-kb982214-x64_5e0e4bbc550c76a3f19bd8a62946e34a709e77ba.cab )
Microsoft Windows Server 2008 R2 < SP1 (x86_64), Microsoft Windows Server 2008 R2, Enterprise Edition < SP1 (x86_64), Microsoft Windows Server 2008 R2, Standard Edition < SP1 (x86_64), Microsoft Windows Server 2008 R2, Datacenter Edition < SP1 (x86_64), Microsoft Windows Server 2008 R2, Web Edition < SP1 (x86_64)
Download and install Microsoft patch windows6.1-kb982214-x64.cab (472691 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windows6.1-kb982214-x64_5e0e4bbc550c76a3f19bd8a62946e34a709e77ba.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windows6.1-kb982214-x64_5e0e4bbc550c76a3f19bd8a62946e34a709e77ba.cab )
Microsoft Windows 7 < SP1 (x86), Microsoft Windows 7 Home, Basic Edition < SP1 (x86), Microsoft Windows 7 Home, Basic N Edition < SP1 (x86), Microsoft Windows 7 Home, Premium Edition < SP1 (x86), Microsoft Windows 7 Home, Premium N Edition < SP1 (x86), Microsoft Windows 7 Ultimate Edition < SP1 (x86), Microsoft Windows 7 Ultimate N Edition < SP1 (x86), Microsoft Windows 7 Enterprise Edition < SP1 (x86), Microsoft Windows 7 Enterprise N Edition < SP1 (x86), Microsoft Windows 7 Professional Edition < SP1 (x86), Microsoft Windows 7 Starter Edition < SP1 (x86), Microsoft Windows 7 Starter N Edition < SP1 (x86)
Download and install Microsoft patch windows6.1-kb982214-x86.cab (327665 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windows6.1-kb982214-x86_64510c7e538a829499509d65018ae2c4894b8238.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windows6.1-kb982214-x86_64510c7e538a829499509d65018ae2c4894b8238.cab )
Microsoft Windows XP Professional SP3 (x86), Microsoft Windows XP Home SP3 (x86)
Download and install Microsoft patch windowsxp-kb982214-x86-enu.exe (661368 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windowsxp-kb982214-x86-enu_a24853f682dad3157da4e4a39372951a8ec1e407.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windowsxp-kb982214-x86-enu_a24853f682dad3157da4e4a39372951a8ec1e407.exe )
Microsoft Windows XP Professional SP2 (x86_64)
Download and install Microsoft patch windowsserver2003.windowsxp-kb982214-x64-enu.exe (1027968 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windowsserver2003.windowsxp-kb982214-x64-enu_3780ab4068c4715ca93c4d5e4d9d4dbf9bbb6bc3.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windowsserver2003.windowsxp-kb982214-x64-enu_3780ab4068c4715ca93c4d5e4d9d4dbf9bbb6bc3.exe )
Microsoft Windows Server 2008 SP2 OR SP1 (x86), Microsoft Windows Server 2008 Enterprise Edition SP2 OR SP1 (x86), Microsoft Windows Server 2008 Standard Edition SP2 OR SP1 (x86), Microsoft Windows Server 2008 Datacenter Edition SP2 OR SP1 (x86), Microsoft Windows Server 2008 HPC Edition SP2 OR SP1 (x86), Microsoft Windows Server 2008 Web Edition SP2 OR SP1 (x86), Microsoft Windows Server 2008 Storage Edition SP2 OR SP1 (x86), Microsoft Windows Small Business Server 2008 SP2 OR SP1 (x86), Microsoft Windows Essential Business Server 2008 SP2 OR SP1 (x86)
Download and install Microsoft patch windows6.0-kb982214-x86.cab (325694 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windows6.0-kb982214-x86_50d77476159fef060a2470a0f66e7e8ecb9808ea.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windows6.0-kb982214-x86_50d77476159fef060a2470a0f66e7e8ecb9808ea.cab )
Microsoft Windows Vista SP2 OR SP1 (x86_64), Microsoft Windows Vista Home, Basic Edition SP2 OR SP1 (x86_64), Microsoft Windows Vista Home, Basic N Edition SP2 OR SP1 (x86_64), Microsoft Windows Vista Home, Premium Edition SP2 OR SP1 (x86_64), Microsoft Windows Vista Ultimate Edition SP2 OR SP1 (x86_64), Microsoft Windows Vista Enterprise Edition SP2 OR SP1 (x86_64), Microsoft Windows Vista Business Edition SP2 OR SP1 (x86_64), Microsoft Windows Vista Business N Edition SP2 OR SP1 (x86_64), Microsoft Windows Vista Starter Edition SP2 OR SP1 (x86_64)
Download and install Microsoft patch windows6.0-kb982214-x64.cab (526660 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windows6.0-kb982214-x64_d01b09bc4ccbae1f654548187a07776c1cc6ac2c.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windows6.0-kb982214-x64_d01b09bc4ccbae1f654548187a07776c1cc6ac2c.cab )
Microsoft Windows Vista SP2 OR SP1 (x86), Microsoft Windows Vista Home, Basic Edition SP2 OR SP1 (x86), Microsoft Windows Vista Home, Basic N Edition SP2 OR SP1 (x86), Microsoft Windows Vista Home, Premium Edition SP2 OR SP1 (x86), Microsoft Windows Vista Ultimate Edition SP2 OR SP1 (x86), Microsoft Windows Vista Enterprise Edition SP2 OR SP1 (x86), Microsoft Windows Vista Business Edition SP2 OR SP1 (x86), Microsoft Windows Vista Business N Edition SP2 OR SP1 (x86), Microsoft Windows Vista Starter Edition SP2 OR SP1 (x86)
Download and install Microsoft patch windows6.0-kb982214-x86.cab (325694 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windows6.0-kb982214-x86_50d77476159fef060a2470a0f66e7e8ecb9808ea.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windows6.0-kb982214-x86_50d77476159fef060a2470a0f66e7e8ecb9808ea.cab )
Microsoft Windows Server 2008 SP2 OR SP1 (x86_64), Microsoft Windows Server 2008 Enterprise Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2008 Standard Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2008 Datacenter Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2008 HPC Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2008 Web Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2008 Storage Edition SP2 OR SP1 (x86_64), Microsoft Windows Small Business Server 2008 SP2 OR SP1 (x86_64), Microsoft Windows Essential Business Server 2008 SP2 OR SP1 (x86_64)
Download and install Microsoft patch windows6.0-kb982214-x64.cab (526660 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windows6.0-kb982214-x64_d01b09bc4ccbae1f654548187a07776c1cc6ac2c.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windows6.0-kb982214-x64_d01b09bc4ccbae1f654548187a07776c1cc6ac2c.cab )
Microsoft Windows Server 2008 SP2 OR SP1 (ia64), Microsoft Windows Server 2008 Enterprise Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2008 Standard Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2008 Datacenter Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2008 HPC Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2008 Web Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2008 Storage Edition SP2 OR SP1 (ia64), Microsoft Windows Small Business Server 2008 SP2 OR SP1 (ia64), Microsoft Windows Essential Business Server 2008 SP2 OR SP1 (ia64)
Download and install Microsoft patch windows6.0-kb982214-ia64.cab (828775 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windows6.0-kb982214-ia64_16915a0396cce04aa40749c46917fc1bc5c8fa33.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2010/07/windows6.0-kb982214-ia64_16915a0396cce04aa40749c46917fc1bc5c8fa33.cab )
This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities.
Affected Nodes: |
Additional Information: |
---|---|
192.168.56.103:139 |
Running vulnerable CIFS service. Vulnerable OS: Microsoft Windows XP Based on the result of the "MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution" test, this node is vulnerable to this additional issue as well. |
192.168.56.103:445 |
Running vulnerable CIFS service. Vulnerable OS: Microsoft Windows XP Based on the result of the "MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution" test, this node is vulnerable to this additional issue as well. |
Source |
Reference |
---|---|
BID |
47198 ( http://www.securityfocus.com/bid/47198 ) |
CVE |
CVE-2011-0661 ( http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0661 ) |
MS |
MS11-020 ( http://www.microsoft.com/technet/security/bulletin/MS11-020.mspx ) |
MSKB |
2508429 ( http://support.microsoft.com/default.aspx?scid=kb;EN-US;2508429 ) |
OSVDB |
71781 ( http://www.osvdb.org/displayvuln.php?osvdb_id=71781 ) |
OVAL |
OVAL12076 ( http://oval.mitre.org/oval/definitions/data/OVAL12076.html ) |
SECUNIA |
44072 ( http://secunia.com/advisories/44072/ ) |
Microsoft Windows Server 2003, Datacenter Edition SP2 (ia64), Microsoft Windows Server 2003 SP2 (ia64), Microsoft Windows Server 2003, Standard Edition SP2 (ia64), Microsoft Windows Server 2003, Enterprise Edition SP2 (ia64), Microsoft Windows Server 2003, Web Edition SP2 (ia64), Microsoft Windows Small Business Server 2003 SP2 (ia64)
Download and install Microsoft patch windowsserver2003-kb2508429-ia64-enu.exe (1594752 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windowsserver2003-kb2508429-ia64-enu_faf3379e9a02880b55216401f0a17a55be2828ff.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windowsserver2003-kb2508429-ia64-enu_faf3379e9a02880b55216401f0a17a55be2828ff.exe )
Microsoft Windows 7 SP1 OR < SP1 (x86), Microsoft Windows 7 Home, Basic Edition SP1 OR < SP1 (x86), Microsoft Windows 7 Home, Basic N Edition SP1 OR < SP1 (x86), Microsoft Windows 7 Home, Premium Edition SP1 OR < SP1 (x86), Microsoft Windows 7 Home, Premium N Edition SP1 OR < SP1 (x86), Microsoft Windows 7 Ultimate Edition SP1 OR < SP1 (x86), Microsoft Windows 7 Ultimate N Edition SP1 OR < SP1 (x86), Microsoft Windows 7 Enterprise Edition SP1 OR < SP1 (x86), Microsoft Windows 7 Enterprise N Edition SP1 OR < SP1 (x86), Microsoft Windows 7 Professional Edition SP1 OR < SP1 (x86), Microsoft Windows 7 Starter Edition SP1 OR < SP1 (x86), Microsoft Windows 7 Starter N Edition SP1 OR < SP1 (x86)
Download and install Microsoft patch windows6.1-kb2508429-x86.cab (356305 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windows6.1-kb2508429-x86_f2be12aa3f8a2ced67f0775ebe49ac2ae83eed4e.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windows6.1-kb2508429-x86_f2be12aa3f8a2ced67f0775ebe49ac2ae83eed4e.cab )
Microsoft Windows Server 2008 SP2 OR SP1 (x86), Microsoft Windows Server 2008 Enterprise Edition SP2 OR SP1 (x86), Microsoft Windows Server 2008 Standard Edition SP2 OR SP1 (x86), Microsoft Windows Server 2008 Datacenter Edition SP2 OR SP1 (x86), Microsoft Windows Server 2008 HPC Edition SP2 OR SP1 (x86), Microsoft Windows Server 2008 Web Edition SP2 OR SP1 (x86), Microsoft Windows Server 2008 Storage Edition SP2 OR SP1 (x86), Microsoft Windows Small Business Server 2008 SP2 OR SP1 (x86), Microsoft Windows Essential Business Server 2008 SP2 OR SP1 (x86)
Download and install Microsoft patch windows6.0-kb2508429-x86.cab (332927 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windows6.0-kb2508429-x86_2e7adf8e8e545432372edbd59952a925fb7a69da.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windows6.0-kb2508429-x86_2e7adf8e8e545432372edbd59952a925fb7a69da.cab )
Microsoft Windows Server 2008 R2 SP1 OR < SP1 (ia64), Microsoft Windows Server 2008 R2, Enterprise Edition SP1 OR < SP1 (ia64), Microsoft Windows Server 2008 R2, Standard Edition SP1 OR < SP1 (ia64), Microsoft Windows Server 2008 R2, Datacenter Edition SP1 OR < SP1 (ia64), Microsoft Windows Server 2008 R2, Web Edition SP1 OR < SP1 (ia64)
Download and install Microsoft patch windows6.1-kb2508429-ia64.cab (944649 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windows6.1-kb2508429-ia64_608095e0f23a03b2ad13993d669e24d7c2085c82.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windows6.1-kb2508429-ia64_608095e0f23a03b2ad13993d669e24d7c2085c82.cab )
Microsoft Windows Server 2003, Datacenter Edition SP2 (x86_64), Microsoft Windows Server 2003 SP2 (x86_64), Microsoft Windows Server 2003, Standard Edition SP2 (x86_64), Microsoft Windows Server 2003, Enterprise Edition SP2 (x86_64), Microsoft Windows Server 2003, Web Edition SP2 (x86_64), Microsoft Windows Small Business Server 2003 SP2 (x86_64)
Download and install Microsoft patch windowsserver2003.windowsxp-kb2508429-x64-enu.exe (1044864 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windowsserver2003.windowsxp-kb2508429-x64-enu_a1ab44f33a891a3fdff7273ad240f35d5af7ce99.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windowsserver2003.windowsxp-kb2508429-x64-enu_a1ab44f33a891a3fdff7273ad240f35d5af7ce99.exe )
Microsoft Windows Server 2008 R2 SP1 OR < SP1 (x86_64), Microsoft Windows Server 2008 R2, Enterprise Edition SP1 OR < SP1 (x86_64), Microsoft Windows Server 2008 R2, Standard Edition SP1 OR < SP1 (x86_64), Microsoft Windows Server 2008 R2, Datacenter Edition SP1 OR < SP1 (x86_64), Microsoft Windows Server 2008 R2, Web Edition SP1 OR < SP1 (x86_64)
Download and install Microsoft patch windows6.1-kb2508429-x64.cab (603705 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windows6.1-kb2508429-x64_4728219cedc4a3c80dfb7e46106f48dc766a45cf.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windows6.1-kb2508429-x64_4728219cedc4a3c80dfb7e46106f48dc766a45cf.cab )
Microsoft Windows Vista SP2 OR SP1 (x86_64), Microsoft Windows Vista Home, Basic Edition SP2 OR SP1 (x86_64), Microsoft Windows Vista Home, Basic N Edition SP2 OR SP1 (x86_64), Microsoft Windows Vista Home, Premium Edition SP2 OR SP1 (x86_64), Microsoft Windows Vista Ultimate Edition SP2 OR SP1 (x86_64), Microsoft Windows Vista Enterprise Edition SP2 OR SP1 (x86_64), Microsoft Windows Vista Business Edition SP2 OR SP1 (x86_64), Microsoft Windows Vista Business N Edition SP2 OR SP1 (x86_64), Microsoft Windows Vista Starter Edition SP2 OR SP1 (x86_64)
Download and install Microsoft patch windows6.0-kb2508429-x64.cab (548015 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windows6.0-kb2508429-x64_3699754fcaac488ea60cd1886b6929f9610f7a0e.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windows6.0-kb2508429-x64_3699754fcaac488ea60cd1886b6929f9610f7a0e.cab )
Microsoft Windows Server 2003, Datacenter Edition SP2 (x86), Microsoft Windows Server 2003 SP2 (x86), Microsoft Windows Server 2003, Standard Edition SP2 (x86), Microsoft Windows Server 2003, Enterprise Edition SP2 (x86), Microsoft Windows Server 2003, Web Edition SP2 (x86), Microsoft Windows Small Business Server 2003 SP2 (x86)
Download and install Microsoft patch windowsserver2003-kb2508429-x86-enu.exe (693120 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windowsserver2003-kb2508429-x86-enu_1d4ff4ef7163f06d580e7fbc94cc222bafd0733f.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windowsserver2003-kb2508429-x86-enu_1d4ff4ef7163f06d580e7fbc94cc222bafd0733f.exe )
Microsoft Windows XP Professional SP2 (x86_64)
Download and install Microsoft patch windowsserver2003.windowsxp-kb2508429-x64-enu.exe (1044864 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windowsserver2003.windowsxp-kb2508429-x64-enu_a1ab44f33a891a3fdff7273ad240f35d5af7ce99.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windowsserver2003.windowsxp-kb2508429-x64-enu_a1ab44f33a891a3fdff7273ad240f35d5af7ce99.exe )
Microsoft Windows XP Professional SP3 (x86), Microsoft Windows XP Home SP3 (x86)
Download and install Microsoft patch windowsxp-kb2508429-x86-enu.exe (664960 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windowsxp-kb2508429-x86-enu_e0b40d81f2ecc1bad43439a6bd0a9e2a0ab7dd56.exe ( http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windowsxp-kb2508429-x86-enu_e0b40d81f2ecc1bad43439a6bd0a9e2a0ab7dd56.exe )
Microsoft Windows 7 SP1 OR < SP1 (x86_64), Microsoft Windows 7 Home, Basic Edition SP1 OR < SP1 (x86_64), Microsoft Windows 7 Home, Basic N Edition SP1 OR < SP1 (x86_64), Microsoft Windows 7 Home, Premium Edition SP1 OR < SP1 (x86_64), Microsoft Windows 7 Home, Premium N Edition SP1 OR < SP1 (x86_64), Microsoft Windows 7 Ultimate Edition SP1 OR < SP1 (x86_64), Microsoft Windows 7 Ultimate N Edition SP1 OR < SP1 (x86_64), Microsoft Windows 7 Enterprise Edition SP1 OR < SP1 (x86_64), Microsoft Windows 7 Enterprise N Edition SP1 OR < SP1 (x86_64), Microsoft Windows 7 Professional Edition SP1 OR < SP1 (x86_64), Microsoft Windows 7 Starter Edition SP1 OR < SP1 (x86_64), Microsoft Windows 7 Starter N Edition SP1 OR < SP1 (x86_64)
Download and install Microsoft patch windows6.1-kb2508429-x64.cab (603705 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windows6.1-kb2508429-x64_4728219cedc4a3c80dfb7e46106f48dc766a45cf.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windows6.1-kb2508429-x64_4728219cedc4a3c80dfb7e46106f48dc766a45cf.cab )
Microsoft Windows Server 2008 SP2 OR SP1 (x86_64), Microsoft Windows Server 2008 Enterprise Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2008 Standard Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2008 Datacenter Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2008 HPC Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2008 Web Edition SP2 OR SP1 (x86_64), Microsoft Windows Server 2008 Storage Edition SP2 OR SP1 (x86_64), Microsoft Windows Small Business Server 2008 SP2 OR SP1 (x86_64), Microsoft Windows Essential Business Server 2008 SP2 OR SP1 (x86_64)
Download and install Microsoft patch windows6.0-kb2508429-x64.cab (548015 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windows6.0-kb2508429-x64_3699754fcaac488ea60cd1886b6929f9610f7a0e.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windows6.0-kb2508429-x64_3699754fcaac488ea60cd1886b6929f9610f7a0e.cab )
Microsoft Windows Server 2008 SP2 OR SP1 (ia64), Microsoft Windows Server 2008 Enterprise Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2008 Standard Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2008 Datacenter Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2008 HPC Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2008 Web Edition SP2 OR SP1 (ia64), Microsoft Windows Server 2008 Storage Edition SP2 OR SP1 (ia64), Microsoft Windows Small Business Server 2008 SP2 OR SP1 (ia64), Microsoft Windows Essential Business Server 2008 SP2 OR SP1 (ia64)
Download and install Microsoft patch windows6.0-kb2508429-ia64.cab (846931 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windows6.0-kb2508429-ia64_d97ec35684c8c68a36fab50beea83b8b974aa4a2.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windows6.0-kb2508429-ia64_d97ec35684c8c68a36fab50beea83b8b974aa4a2.cab )
Microsoft Windows Vista SP2 OR SP1 (x86), Microsoft Windows Vista Home, Basic Edition SP2 OR SP1 (x86), Microsoft Windows Vista Home, Basic N Edition SP2 OR SP1 (x86), Microsoft Windows Vista Home, Premium Edition SP2 OR SP1 (x86), Microsoft Windows Vista Ultimate Edition SP2 OR SP1 (x86), Microsoft Windows Vista Enterprise Edition SP2 OR SP1 (x86), Microsoft Windows Vista Business Edition SP2 OR SP1 (x86), Microsoft Windows Vista Business N Edition SP2 OR SP1 (x86), Microsoft Windows Vista Starter Edition SP2 OR SP1 (x86)
Download and install Microsoft patch windows6.0-kb2508429-x86.cab (332927 bytes)
Download and apply the patch from: http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windows6.0-kb2508429-x86_2e7adf8e8e545432372edbd59952a925fb7a69da.cab ( http://download.windowsupdate.com/msdownload/update/software/secu/2011/03/windows6.0-kb2508429-x86_2e7adf8e8e545432372edbd59952a925fb7a69da.cab )
NULL sessions allow anonymous users to establish unauthenticated CIFS sessions with Windows or third-party CIFS implementations such as Samba ( http://www.samba.org ) or the Solaris CIFS Server ( http://www.opensolaris.org/os/project/cifs-server/ ) . These anonymous users may be able to enumerate local users, groups, servers, shares, domains, domain policies, and may be able to access various MSRPC services through RPC function calls. These services have been historically affected by numerous vulnerabilities. The wealth of information available to attackers through NULL sessions may also allow them to carry out more sophisticated attacks.
Affected Nodes: |
Additional Information: |
---|---|
192.168.56.103 |
|
Source |
Reference |
---|---|
CVE |
CVE-1999-0519 ( http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0519 ) |
MSKB |
143474 ( http://support.microsoft.com/default.aspx?scid=kb;EN-US;143474 ) |
URL |
http://www.hsc.fr/ressources/presentations/null_sessions/ ( http://www.hsc.fr/ressources/presentations/null_sessions/ ) |
Microsoft Windows 2003, Microsoft Windows Server 2003, Standard Edition, Microsoft Windows Server 2003, Enterprise Edition, Microsoft Windows Server 2003, Datacenter Edition, Microsoft Windows Server 2003, Web Edition, Microsoft Windows Small Business Server 2003
Disable NULL sessions
Modify the registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\
with the following values:
Value Name: RestrictAnonymous Data Type: REG_DWORD Data Value: 1
Value Name: RestrictAnonymousSAM Data Type: REG_DWORD Data Value: 1
Value Name: EveryoneIncludesAnonymous Data Type: REG_DWORD Data Value: 0
and set the following value to 0 (or, alternatively, delete it):
Value Name: TurnOffAnonymousBlock Data Type: REG_DWORD Data Value: 0
Modify the registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters\
with the following values:
Value Name: RestrictNullSessAccess Data Type: REG_DWORD Data Value: 1
Value Name: NullSessionPipes Data Type: REG_MULTI_SZ Data Value: "" (empty string, without quotes)
Open Local Security Settings, and disable the following setting:
Security Settings -> Local Policies -> Security Options -> Network access: Allow anonymous SID/Name translation: Disabled
Finally, reboot the machine.
Please note that disabling NULL sessions may have an adverse impact on functionality, as some applications and network environments may depend on them for proper operation. Refer to Microsoft Knowledge Base Article 823659 ( http://support.microsoft.com/kb/823659 ) for more information.
Microsoft Windows XP, Microsoft Windows XP Home, Microsoft Windows XP Professional
Disable NULL sessions
Modify the registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\
with the following values:
Value Name: RestrictAnonymous Data Type: REG_DWORD Data Value: 1
Value Name: RestrictAnonymousSAM Data Type: REG_DWORD Data Value: 1
Value Name: EveryoneIncludesAnonymous Data Type: REG_DWORD Data Value: 0
Modify the registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters\
with the following values:
Value Name: RestrictNullSessAccess Data Type: REG_DWORD Data Value: 1
Value Name: NullSessionPipes Data Type: REG_MULTI_SZ Data Value: "" (empty string, without quotes)
Open Local Security Settings, and disable the following setting:
Security Settings -> Local Policies -> Security Options -> Network access: Allow anonymous SID/Name translation: Disabled
Finally, reboot the machine.
Please note that disabling NULL sessions may have an adverse impact on functionality, as some applications and network environments may depend on them for proper operation. Refer to Microsoft Knowledge Base Article Q246261 ( http://support.microsoft.com/kb/q246261/ ) for more information.
Microsoft Windows 2000, Microsoft Windows 2000 Professional, Microsoft Windows 2000 Server, Microsoft Windows 2000 Advanced Server, Microsoft Windows 2000 Datacenter Server
Disable NULL sessions
Modify the registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\
with the following value:
Value Name: RestrictAnonymous Data Type: REG_DWORD Data Value: 2
After modifying the registry, reboot the machine.
Please note that disabling NULL sessions may have an adverse impact on functionality, as some applications and network environments may depend on them for proper operation. Refer to Microsoft Knowledge Base Article Q246261 ( http://support.microsoft.com/kb/q246261/ ) for more information.
Microsoft Windows NT Server 4.0, Microsoft Windows NT Server, Enterprise Edition 4.0, Microsoft Windows NT Workstation 4.0
Install Microsoft service pack Windows NT4 Service Pack 4
Download and apply the upgrade from: http://support.microsoft.com/sp ( http://support.microsoft.com/sp )
Microsoft Windows NT, Microsoft Windows NT Workstation, Microsoft Windows NT Server, Microsoft Windows NT Advanced Server, Microsoft Windows NT Server, Enterprise Edition, Microsoft Windows NT Server, Terminal Server Edition
Disable NULL sessions
Modify the registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\
with the following value:
Value Name: RestrictAnonymous Data Type: REG_DWORD Data Value: 1
After modifying the registry, reboot the machine.
It is important to note that on Windows NT 4.0 systems, setting this registry entry will still leave the system open to various attacks, including brute-force enumeration of users and groups. A complete solution for Windows NT 4.0 systems is not available.
Samba on Linux
Restrict anonymous access
To restrict anonymous access to Samba, modify your "smb.conf" settings as follows:
guest account = nobody restrict anonymous = 1
Note: Make sure you do NOT list a user "nobody" in your password file.
Novell NetWare
Novell Netware CIFS
As of May 9, 2007 Novell Netware CIFS does not provide a workaround for this vulnerability.
Your system may require one or more security patches or hotfixes from Microsoft.
This update resolves several newly discovered, privately reported vulnerabilities. We recommend that customers apply the update immediately.
Affected Nodes: |
Additional Information: |
---|---|
192.168.56.103 |
Vulnerable OS: Microsoft Windows XP Server responded with vulnerable error code: 2 and class: 1 |
Source |
Reference |
---|---|
BID |
18863 ( http://www.securityfocus.com/bid/18863 ) |
BID |
18891 ( http://www.securityfocus.com/bid/18891 ) |
CERT |
TA06-192A ( http://www.cert.org/advisories/TA06-192A.html ) |
CERT-VN |
189140 ( http://www.kb.cert.org/vuls/id/189140 ) |
CERT-VN |
333636 ( http://www.kb.cert.org/vuls/id/333636 ) |
CVE |
CVE-2006-1314 ( http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1314 ) |
CVE |
CVE-2006-1315 ( http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1315 ) |
MS |
MS06-035 ( http://www.microsoft.com/technet/security/bulletin/MS06-035.mspx ) |
MSKB |
917159 ( http://support.microsoft.com/default.aspx?scid=kb;EN-US;917159 ) |
OSVDB |
27154 ( http://www.osvdb.org/displayvuln.php?osvdb_id=27154 ) |
OSVDB |
27155 ( http://www.osvdb.org/displayvuln.php?osvdb_id=27155 ) |
OVAL |
OVAL3 ( http://oval.mitre.org/oval/definitions/data/OVAL3.html ) |
OVAL |
OVAL600 ( http://oval.mitre.org/oval/definitions/data/OVAL600.html ) |
SANS-06 |
W4 ( http://www.sans.org/top20/2006/#w4 ) |
SANS-07 |
S2 ( http://www.sans.org/top20/2007/#s2 ) |
SECUNIA |
21007 ( http://secunia.com/advisories/21007/ ) |
XF |
win-mailslot-bo(26818) ( http://xforce.iss.net/xforce/xfdb/26818 ) |
XF |
win-smb-information-disclosure(26820) ( http://xforce.iss.net/xforce/xfdb/26820 ) |
Microsoft Windows XP Professional SP1 OR SP2 (x86), Microsoft Windows XP Home SP1 OR SP2 (x86)
Download and install Microsoft patch WindowsXP-KB917159-x86-ENU.exe (725304 bytes)
Download and apply the patch from: http://www.download.windowsupdate.com/msdownload/update/v3-19990518/cabpool/windowsxp-kb917159-x86-enu_5ed838e18ceae61a8d94f8c4be2462a8e19212d7.exe ( http://www.download.windowsupdate.com/msdownload/update/v3-19990518/cabpool/windowsxp-kb917159-x86-enu_5ed838e18ceae61a8d94f8c4be2462a8e19212d7.exe )
Microsoft Windows Server 2003 SP1 OR < SP1 (x86), Microsoft Windows Server 2003, Standard Edition SP1 OR < SP1 (x86), Microsoft Windows Server 2003, Enterprise Edition SP1 OR < SP1 (x86), Microsoft Windows Server 2003, Datacenter Edition SP1 OR < SP1 (x86), Microsoft Windows Server 2003, Web Edition SP1 OR < SP1 (x86), Microsoft Windows Small Business Server 2003 SP1 OR < SP1 (x86)
Download and install Microsoft patch WindowsServer2003-KB917159-x86-ENU.exe (801592 bytes)
Download and apply the patch from: http://www.download.windowsupdate.com/msdownload/update/v3-19990518/cabpool/windowsserver2003-kb917159-x86-enu_95e39a9f4fe1396962cc64c0dfd8372503bf9973.exe ( http://www.download.windowsupdate.com/msdownload/update/v3-19990518/cabpool/windowsserver2003-kb917159-x86-enu_95e39a9f4fe1396962cc64c0dfd8372503bf9973.exe )
Microsoft Windows Server 2003 SP1 OR < SP1 (ia64), Microsoft Windows Server 2003, Standard Edition SP1 OR < SP1 (ia64), Microsoft Windows Server 2003, Enterprise Edition SP1 OR < SP1 (ia64), Microsoft Windows Server 2003, Datacenter Edition SP1 OR < SP1 (ia64), Microsoft Windows Server 2003, Web Edition SP1 OR < SP1 (ia64), Microsoft Windows Small Business Server 2003 SP1 OR < SP1 (ia64)
Download and install Microsoft patch WindowsServer2003-KB917159-ia64-ENU.exe (1922872 bytes)
Download and apply the patch from: http://www.download.windowsupdate.com/msdownload/update/v3-19990518/cabpool/windowsserver2003-kb917159-ia64-enu_bfc6d3b13f8b485634488eda6ff18363cfe70141.exe ( http://www.download.windowsupdate.com/msdownload/update/v3-19990518/cabpool/windowsserver2003-kb917159-ia64-enu_bfc6d3b13f8b485634488eda6ff18363cfe70141.exe )
Microsoft Windows XP Professional SP1 (x86_64)
Download and install Microsoft patch WindowsServer2003.WindowsXP-KB917159-x64-ENU.exe (1033528 bytes)
Download and apply the patch from: http://www.download.windowsupdate.com/msdownload/update/v3-19990518/cabpool/windowsserver2003.windowsxp-kb917159-x64-enu_93a5cfec377221668b923e88a741ce1cadcb76c1.exe ( http://www.download.windowsupdate.com/msdownload/update/v3-19990518/cabpool/windowsserver2003.windowsxp-kb917159-x64-enu_93a5cfec377221668b923e88a741ce1cadcb76c1.exe )
Microsoft Windows Server 2003 SP1 (x86_64), Microsoft Windows Server 2003, Standard Edition SP1 (x86_64), Microsoft Windows Server 2003, Enterprise Edition SP1 (x86_64), Microsoft Windows Server 2003, Datacenter Edition SP1 (x86_64), Microsoft Windows Server 2003, Web Edition SP1 (x86_64), Microsoft Windows Small Business Server 2003 SP1 (x86_64)
Download and install Microsoft patch WindowsServer2003.WindowsXP-KB917159-x64-ENU.exe (1033528 bytes)
Download and apply the patch from: http://www.download.windowsupdate.com/msdownload/update/v3-19990518/cabpool/windowsserver2003.windowsxp-kb917159-x64-enu_93a5cfec377221668b923e88a741ce1cadcb76c1.exe ( http://www.download.windowsupdate.com/msdownload/update/v3-19990518/cabpool/windowsserver2003.windowsxp-kb917159-x64-enu_93a5cfec377221668b923e88a741ce1cadcb76c1.exe )
Microsoft Windows 2000 SP4 (x86), Microsoft Windows 2000 Professional SP4 (x86), Microsoft Windows 2000 Server SP4 (x86), Microsoft Windows 2000 Advanced Server SP4 (x86), Microsoft Windows 2000 Datacenter Server SP4 (x86)
Download and install Microsoft patch Windows2000-KB917159-x86-ENU.EXE (614888 bytes)
Download and apply the patch from: http://www.download.windowsupdate.com/msdownload/update/v3-19990518/cabpool/windows2000-kb917159-x86-enu_e685b01f66b72125ed2c97afd2813ce309b9a7f5.exe ( http://www.download.windowsupdate.com/msdownload/update/v3-19990518/cabpool/windows2000-kb917159-x86-enu_e685b01f66b72125ed2c97afd2813ce309b9a7f5.exe )
This system does not allow SMB signing. SMB signing allows the recipient of SMB packets to confirm their authenticity and helps prevent man in the middle attacks against SMB. SMB signing can be configured in one of three ways: disabled entirely (least secure), enabled, and required (most secure).
Affected Nodes: |
Additional Information: |
---|---|
192.168.56.103:139 |
Negotiate protocol response's security mode 3 indicates that SMB signing is disabled |
192.168.56.103:445 |
Negotiate protocol response's security mode 3 indicates that SMB signing is disabled |
Source |
Reference |
---|---|
URL |
http://blogs.technet.com/b/josebda/archive/2010/12/01/the-basics-of-smb-signing-covering-both-smb1-and-smb2.aspx ( http://blogs.technet.com/b/josebda/archive/2010/12/01/the-basics-of-smb-signing-covering-both-smb1-and-smb2.aspx ) |
MSKB |
887429 ( http://support.microsoft.com/default.aspx?scid=kb;EN-US;887429 ) |
Microsoft Windows
Configure SMB signing
Configure the system to enable or require SMB signing as appropriate. The method for doing this is system specific so please see KB 887429 ( http://support.microsoft.com/kb/887429 ) for details. Note: ensure that SMB signing configuration is done for incoming connections (Server).
Samba
Configure SMB signing
Configure Samba to enable or require SMB signing as appropriate. To enable SMB signing, put the following in the Samba configuration file, typically smb.conf, in the global section:
server signing = autoTo require SMB signing, put the following in the Samba configuration file, typically smb.conf, in the global section:
server signing = mandatory
This system enables, but does not require SMB signing. SMB signing allows the recipient of SMB packets to confirm their authenticity and helps prevent man in the middle attacks against SMB. SMB signing can be configured in one of three ways: disabled entirely (least secure), enabled, and required (most secure).
Affected Nodes: |
Additional Information: |
---|---|
192.168.56.103:139 |
Negotiate protocol response's security mode 3 indicates that SMB signing is not required |
192.168.56.103:445 |
Negotiate protocol response's security mode 3 indicates that SMB signing is not required |
Source |
Reference |
---|---|
URL |
http://blogs.technet.com/b/josebda/archive/2010/12/01/the-basics-of-smb-signing-covering-both-smb1-and-smb2.aspx ( http://blogs.technet.com/b/josebda/archive/2010/12/01/the-basics-of-smb-signing-covering-both-smb1-and-smb2.aspx ) |
MSKB |
887429 ( http://support.microsoft.com/default.aspx?scid=kb;EN-US;887429 ) |
Microsoft Windows
Configure SMB signing
Configure the system to enable or require SMB signing as appropriate. The method for doing this is system specific so please see KB 887429 ( http://support.microsoft.com/kb/887429 ) for details. Note: ensure that SMB signing configuration is done for incoming connections (Server).
Samba
Configure SMB signing
Configure Samba to enable or require SMB signing as appropriate. To enable SMB signing, put the following in the Samba configuration file, typically smb.conf, in the global section:
server signing = autoTo require SMB signing, put the following in the Samba configuration file, typically smb.conf, in the global section:
server signing = mandatory
The remote host responded to an ICMP timestamp request. The ICMP timestamp response contains the remote host's date and time. This information could theoretically be used against some systems to exploit weak time-based random number generators in other services.
In addition, the versions of some operating systems can be accurately fingerprinted by analyzing their responses to invalid ICMP timestamp requests.
Affected Nodes: |
Additional Information: |
---|---|
192.168.56.103 |
Remote system time: 02:47:09.902 CET |
Source |
Reference |
---|---|
CVE |
CVE-1999-0524 ( http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0524 ) |
OSVDB |
95 ( http://www.osvdb.org/displayvuln.php?osvdb_id=95 ) |
XF |
icmp-netmask(306) ( http://xforce.iss.net/xforce/xfdb/306 ) |
XF |
icmp-timestamp(322) ( http://xforce.iss.net/xforce/xfdb/322 ) |
HP-UX
Disable ICMP timestamp responses on HP/UX
Execute the following command:
ndd -set /dev/ip ip_respond_to_timestamp_broadcast 0
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13 (timestamp request) and 14 (timestamp response).
Cisco IOS
Disable ICMP timestamp responses on Cisco IOS
Use ACLs to block ICMP types 13 and 14. For example:
deny icmp any any 13
deny icmp any any 14
Note that it is generally preferable to use ACLs that block everything by default and then selectively allow certain types of traffic in. For example, block everything and then only allow ICMP unreachable, ICMP echo reply, ICMP time exceeded, and ICMP source quench:
permit icmp any any unreachable
permit icmp any any echo-reply
permit icmp any any time-exceeded
permit icmp any any source-quench
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13 (timestamp request) and 14 (timestamp response).
SGI Irix
Disable ICMP timestamp responses on SGI Irix
IRIX does not offer a way to disable ICMP timestamp responses. Therefore, you should block ICMP on the affected host using ipfilterd, and/or block it at any external firewalls.
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13 (timestamp request) and 14 (timestamp response).
Linux
Disable ICMP timestamp responses on Linux
Linux offers neither a sysctl nor a /proc/sys/net/ipv4 interface to disable ICMP timestamp responses. Therefore, you should block ICMP on the affected host using iptables, and/or block it at the firewall. For example:
ipchains -A input -p icmp --icmp-type timestamp-request -j DROP
ipchains -A output -p icmp --icmp-type timestamp-reply -j DROP
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13 (timestamp request) and 14 (timestamp response).
Microsoft Windows NT, Microsoft Windows NT Workstation, Microsoft Windows NT Server, Microsoft Windows NT Advanced Server, Microsoft Windows NT Server, Enterprise Edition, Microsoft Windows NT Server, Terminal Server Edition
Disable ICMP timestamp responses on Windows NT 4
Windows NT 4 does not provide a way to block ICMP packets. Therefore, you should block them at the firewall.
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13 (timestamp request) and 14 (timestamp response).
OpenBSD
Disable ICMP timestamp responses on OpenBSD
Set the "net.inet.icmp.tstamprepl" sysctl variable to 0.
sysctl -w net.inet.icmp.tstamprepl=0
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13 (timestamp request) and 14 (timestamp response).
Cisco PIX
Disable ICMP timestamp responses on Cisco PIX
A properly configured PIX firewall should never respond to ICMP packets on its external interface. In PIX Software versions 4.1(6) until 5.2.1, ICMP traffic to the PIX's internal interface is permitted; the PIX cannot be configured to NOT respond. Beginning in PIX Software version 5.2.1, ICMP is still permitted on the internal interface by default, but ICMP responses from its internal interfaces can be disabled with the icmp command, as follows, where <inside> is the name of the internal interface:
icmp deny any 13 <inside>
icmp deny any 14 <inside>
Don't forget to save the configuration when you are finished.
See Cisco's support document Handling ICMP Pings with the PIX Firewall ( http://www.cisco.com/warp/public/110/31.html ) for more information.
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13 (timestamp request) and 14 (timestamp response).
Sun Solaris
Disable ICMP timestamp responses on Solaris
Execute the following commands:
/usr/sbin/ndd -set /dev/ip ip_respond_to_timestamp 0
/usr/sbin/ndd -set /dev/ip ip_respond_to_timestamp_broadcast 0
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13 (timestamp request) and 14 (timestamp response).
Microsoft Windows 2000, Microsoft Windows 2000 Professional, Microsoft Windows 2000 Server, Microsoft Windows 2000 Advanced Server, Microsoft Windows 2000 Datacenter Server
Disable ICMP timestamp responses on Windows 2000
Use the IPSec filter feature to define and apply an IP filter list that blocks ICMP types 13 and 14. Note that the standard TCP/IP blocking capability under the "Networking and Dialup Connections" control panel is NOT capable of blocking ICMP (only TCP and UDP). The IPSec filter features, while they may seem strictly related to the IPSec standards, will allow you to selectively block these ICMP packets. See http://support.microsoft.com/kb/313190 ( http://support.microsoft.com/kb/313190 ) for more information.
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13 (timestamp request) and 14 (timestamp response).
Microsoft Windows XP, Microsoft Windows XP Home, Microsoft Windows XP Professional, Microsoft Windows Server 2003, Microsoft Windows Server 2003, Standard Edition, Microsoft Windows Server 2003, Enterprise Edition, Microsoft Windows Server 2003, Datacenter Edition, Microsoft Windows Server 2003, Web Edition, Microsoft Windows Small Business Server 2003
Disable ICMP timestamp responses on Windows XP/2K3
ICMP timestamp responses can be disabled by deselecting the "allow incoming timestamp request" option in the ICMP configuration panel of Windows Firewall.
For more information, see: http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/hnw_understanding_firewall.mspx?mfr=true ( http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/hnw_understanding_firewall.mspx?mfr=true )
Microsoft Windows Vista, Microsoft Windows Vista Home, Basic Edition, Microsoft Windows Vista Home, Basic N Edition, Microsoft Windows Vista Home, Premium Edition, Microsoft Windows Vista Ultimate Edition, Microsoft Windows Vista Enterprise Edition, Microsoft Windows Vista Business Edition, Microsoft Windows Vista Business N Edition, Microsoft Windows Vista Starter Edition, Microsoft Windows Server 2008, Microsoft Windows Server 2008 Standard Edition, Microsoft Windows Server 2008 Enterprise Edition, Microsoft Windows Server 2008 Datacenter Edition, Microsoft Windows Server 2008 HPC Edition, Microsoft Windows Server 2008 Web Edition, Microsoft Windows Server 2008 Storage Edition, Microsoft Windows Small Business Server 2008, Microsoft Windows Essential Business Server 2008
Disable ICMP timestamp responses on Windows Vista/2008
ICMP timestamp responses can be disabled via the netsh command line utility.
For more information, see: http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/hnw_understanding_firewall.mspx?mfr=true ( http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/hnw_understanding_firewall.mspx?mfr=true )
Disable ICMP timestamp responses
Disable ICMP timestamp replies for the device. If the device does not support this level of configuration, the easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13 (timestamp request) and 14 (timestamp response).
CIFS, the Common Internet File System, was defined by Microsoft to provide file sharing services over the Internet. CIFS extends the Server Message Block (SMB) protocol designed by IBM and enhanced by Intel and Microsoft. CIFS provides mechanisms for sharing resources (files, printers, etc.) and executing remote procedure calls over named pipes.
Device |
Protocol |
Port |
Vulnerabilities |
Additional Information |
---|---|---|---|---|
192.168.56.103 |
tcp |
139 |
3 |
|
192.168.56.103 |
tcp |
445 |
3 |
|
CIFS, the Common Internet File System, was defined by Microsoft to provide file sharing services over the Internet. CIFS extends the Server Message Block (SMB) protocol designed by IBM and enhanced by Intel and Microsoft. CIFS provides mechanisms for sharing resources (files, printers, etc.) and executing remote procedure calls over named pipes. This service is used to handle CIFS browsing (name) requests. Responses contain the names and types of services that can be accessed via CIFS named pipes.
Device |
Protocol |
Port |
Vulnerabilities |
Additional Information |
---|---|---|---|---|
192.168.56.103 |
udp |
137 |
0 |
|
The DCE Endpoint Resolution service, aka Endpoint Mapper, is used on Microsoft Windows systems by Remote Procedure Call (RPC) clients to determine the appropriate port number to connect to for a particular RPC service. This is similar to the portmapper service used on Unix systems.
Device |
Protocol |
Port |
Vulnerabilities |
Additional Information |
---|---|---|---|---|
192.168.56.103 |
tcp |
135 |
0 |
The Network Time Protocol (NTP) is used to keep the clocks of machines on a network synchronized. Provisions are made in the protocol to account for network disruption and packet latency.
Device |
Protocol |
Port |
Vulnerabilities |
Additional Information |
---|---|---|---|---|
192.168.56.103 |
udp |
123 |
0 |
No user or group information was discovered during the scan.
No database information was discovered during the scan.
File/Directory Name |
Type |
Properties |
---|---|---|
ADMIN$ |
Directory |
|
C$ |
Directory |
|
No policy evaluations were performed.
No web sites were spidered during the scan.