MS11-085: Vulnerability in Windows Mail and Windows Meeting Space Could Allow Remote Code Execution (2620704)

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.


Synopsis :

Arbitrary code can be executed on the remote Windows host through
Windows Mail and Windows Meeting Space.

Description :

The remote host contains a version of Windows Mail or Windows Meeting
Space that is affected by an insecure library loading vulnerability.

A remote attacker could exploit this by tricking a user into opening a
specially crafted .eml or .wcinv file, resulting in arbitrary code
execution.

See also :

http://technet.microsoft.com/en-us/security/bulletin/ms11-085

Solution :

Microsoft has released a set of patches for Windows Vista, 7, 2008,
and 2008 R2.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.4
(CVSS2#E:F/RL:W/RC:C)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 56738 ()

Bugtraq ID: 50507

CVE ID: CVE-2011-2016