This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.
Arbitrary code can be executed on the remote host through the email
client or the web browser.
The remote host is running a version of Windows with a bug in the
Animated Cursor (ANI) handling routine that could allow an attacker to
execute arbitrary code on the remote host by sending a specially crafted
email or by luring a user on the remote host into visiting a rogue web
Additionally, the system is vulnerable to :
- Local Privilege Elevation (GDI, EMF, Font Rasterizer)
- Denial of Service (WMF)
See also :
Microsoft has released a set of patches for Windows 2000, XP, 2003 and
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 24911 ()
Bugtraq ID: 231942327323275232762327723278
CVE ID: CVE-2006-5586CVE-2006-5758CVE-2007-0038CVE-2007-1211CVE-2007-1212CVE-2007-1213CVE-2007-1215CVE-2007-1765
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.