This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.
Arbitrary code can be executed on the remote Windows host through
Windows Mail and Windows Meeting Space.
The remote host contains a version of Windows Mail or Windows Meeting
Space that is affected by an insecure library loading vulnerability.
A remote attacker could exploit this by tricking a user into opening a
specially crafted .eml or .wcinv file, resulting in arbitrary code
See also :
Microsoft has released a set of patches for Windows Vista, 7, 2008,
and 2008 R2.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.4
Public Exploit Available : true
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 56738 ()
Bugtraq ID: 50507
CVE ID: CVE-2011-2016
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.