Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> Possible GDI+ compromise


Vulnerability Assessment Details

Possible GDI+ compromise

Vulnerability Assessment Summary
Logs in as user 'X' with no password

Detailed Explanation for this Vulnerability Assessment

It was possible to log into the remote host with the login 'X' and
a blank password.

A widely available exploit, using one of the vulnerabilities described
in the Microsoft Bulletin MS04-028 creates such an account. This probably
mean that the remote host has been compromised by the use of this exploit.

See also : http://www.microsoft.com/technet/security/Bulletin/MS04-028.mspx
Solution : Re-install this host, as it has been compromised
Network Security Threat Level: Critical

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Universal New Black Memory Card Reader SD SDHC Micro M2/MMC/TF/CF/MS Card
$2.99
Universal New Black Memory Card Reader SD SDHC Micro M2/MMC/TF/CF/MS Card pictureLOT OF 10 SINGLE 4GB DDR3 PC3-10600S / PC3-12800S SODIMM Laptop Memory #M241
$179.99
LOT OF 10 SINGLE 4GB DDR3 PC3-10600S / PC3-12800S SODIMM Laptop Memory #M241 pictureZOTAC GeForce GTX 1060 Mini, 6GB GDDR5 SAMSUNG MEMORY 24MHs Ethereum
$499.0
ZOTAC GeForce GTX 1060 Mini, 6GB GDDR5 SAMSUNG MEMORY 24MHs Ethereum pictureG.Skill 16GB DDR4-3200 16GB DDR4 3200MHz memory module
$381.61
G.Skill 16GB DDR4-3200 16GB DDR4 3200MHz memory module picture


Discussions

No Discussions have been posted on this vulnerability.