Lucene search

K
openvasCopyright (C) 2010 LSSOPENVAS:102060
HistoryJul 08, 2010 - 12:00 a.m.

Cumulative Security Update for Internet Explorer (939653)

2010-07-0800:00:00
Copyright (C) 2010 LSS
plugins.openvas.org
19

EPSS

0.921

Percentile

99.0%

This critical security update resolves three privately reported
vulnerabilities and one publicly disclosed vulnerability.
The vulnerability with the most serious security impact could allow
remote code execution if a user viewed a specially crafted Web page
using Internet Explorer. Users whose accounts are configured to have
fewer user rights on the system could be less impacted than users
who operate with administrative user rights.

###################################################################
# OpenVAS Network Vulnerability Test
#
# Cumulative Security Update for Internet Explorer (939653)
#
# LSS-NVT-2010-049
#
# Developed by LSS Security Team <http://security.lss.hr>
#
# Copyright (C) 2009 LSS <http://www.lss.hr>
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public
# License along with this program. If not, see
# <http://www.gnu.org/licenses/>.
###################################################################

tag_solution = "Run Windows update or apply patches available from the following
  website:
  http://www.microsoft.com/technet/security/bulletin/ms07-057.mspx";
tag_summary = "This critical security update resolves three privately reported 
  vulnerabilities and one publicly disclosed vulnerability. 
  The vulnerability with the most serious security impact could allow
  remote code execution if a user viewed a specially crafted Web page 
  using Internet Explorer. Users whose accounts are configured to have
  fewer user rights on the system could be less impacted than users 
  who operate with administrative user rights.";

if(description)
{
  script_id(102060);
  script_version("$Revision: 6527 $");
  script_tag(name:"last_modification", value:"$Date: 2017-07-05 07:56:34 +0200 (Wed, 05 Jul 2017) $");
  script_tag(name:"creation_date", value:"2010-07-08 10:59:30 +0200 (Thu, 08 Jul 2010)");
  script_bugtraq_id(25915, 25916, 24911);
  script_cve_id("CVE-2007-3892", "CVE-2007-3893", "CVE-2007-3826");
  script_name("Cumulative Security Update for Internet Explorer (939653)");
  script_xref(name : "URL" , value : "http://secunia.com/secunia_research/2007-1/");
  script_tag(name:"qod_type", value:"executable_version");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2010 LSS");
  script_family("Windows : Microsoft Bulletins");
  script_dependencies("gb_ms_ie_detect.nasl");
  script_mandatory_keys("MS/IE/Version");
  script_require_ports(139, 445);

  script_tag(name : "solution" , value : tag_solution);
  script_tag(name : "summary" , value : tag_summary);
  exit(0);
}

include("smb_nt.inc");
include("secpod_reg.inc");
include("version_func.inc");
include("secpod_smb_func.inc");

if(hotfix_check_sp( win2k:5 ,xp:4 ,win2003:3 ,vista:3 ) <= 0){
  exit(0);
}

ieVer = get_kb_item("MS/IE/Version");
if(!ieVer){
  exit(0);
}

# MS07-033 Hotfix (939653)
if(hotfix_missing(name:"939653") == 0){
  exit(0);
}

dllPath = registry_get_sz(item:"Install Path",
                          key:"SOFTWARE\Microsoft\COM3\Setup");
dllPath += "\mshtml.dll";
share = ereg_replace(pattern:"([A-Z]):.*", replace:"\1$", string:dllPath);
file = ereg_replace(pattern:"[A-Z]:(.*)", replace:"\1", string:dllPath);

vers = GetVer(file:file, share:share);
if(!vers){
  exit(0);
}

#CVE-2007-3892, CVE-2007-3893, CVE-2007-3826
if(hotfix_check_sp(win2k:5) > 0)
{
  SP = get_kb_item("SMB/Win2K/ServicePack");
  if("Service Pack 4" >< SP)
  {
    if(version_in_range(version:vers, test_version:"5.0",
                       test_version2:"5.0.3856.1700") ||
     version_in_range(version:vers, test_version:"6.0",
                       test_version2:"6.0.2800.1601")){
     security_message(0); exit(0);
    }
  }

}
else if(hotfix_check_sp(xp:4) > 0)
{
  SP = get_kb_item("SMB/WinXP/ServicePack");
  if("Service Pack 2" >< SP)
  {
    if(version_in_range(version:vers, test_version:"6.0",
                        test_version2:"6.0.2900.3199") ||
	   version_in_range(version:vers, test_version:"7.0",
                        test_version2:"7.0.6000.16544")){
      security_message(0); exit(0);
    }
  }
  
}

else if(hotfix_check_sp(win2003:3) > 0)
{
  SP = get_kb_item("SMB/Win2003/ServicePack");
  if("Service Pack 1" >< SP)
  {
    if(version_in_range(version:vers, test_version:"6.0",
                        test_version2:"6.0.3790.2993") ||
	   version_in_range(version:vers, test_version:"7.0",
                        test_version2:"7.0.6000.16544")){
      security_message(0); exit(0);
    }
  }
  else if("Service Pack 2" >< SP)
  {

    if(version_in_range(version:vers, test_version:"6.0",
                        test_version2:"6.0.2900.3199") ||
       version_in_range(version:vers, test_version:"6.0",
                        test_version2:"6.0.3790.4134") ||
       version_in_range(version:vers, test_version:"7.0",
                        test_version2:"7.0.6000.16544")){
      security_message(0); exit(0);
    }
  }
  else if("Service Pack 0" >< SP)
  {

    if(version_in_range(version:vers, test_version:"6.0",
                        test_version2:"6.0.3790.2993")){
      security_message(0); exit(0);
    }
  }
}

else if(hotfix_check_sp(vista:2) > 0)
{
  SP = get_kb_item("SMB/WinVista/ServicePack");
  if("Service Pack 0" >< SP)
  {
    if(version_in_range(version:vers, test_version:"7.0",
                        test_version2:"7.0.6000.16546")){
      security_message(0); exit(0);
    }
  } 
}