MS05-031: Vulnerability in Step-by-Step Interactive Training (898458)

High Nessus Plugin ID 18492


Arbitrary code can be executed on the remote host through the training software.


The remote host is running a version of Microsoft Step-by-Step Interactive Training that contains a flaw that could lead to remote code execution.

To exploit this flaw, an attacker would need to trick a user on the remote host into opening a malformed file with the affected application.


Microsoft has released a patch.

See Also

Plugin Details

Severity: High

ID: 18492

File Name: smb_nt_ms05-031.nasl

Version: $Revision: 1.28 $

Type: local

Agent: windows

Published: 2005/06/14

Modified: 2017/08/15

Dependencies: 13855, 57033

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2005/06/14

Vulnerability Publication Date: 2005/06/14

Reference Information

CVE: CVE-2005-1212

BID: 13944

OSVDB: 17304

MSFT: MS05-031

MSKB: 898458