Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> Possible GDI+ compromise


Vulnerability Assessment Details

Possible GDI+ compromise

Vulnerability Assessment Summary
Logs in as user 'X' with no password

Detailed Explanation for this Vulnerability Assessment

It was possible to log into the remote host with the login 'X' and
a blank password.

A widely available exploit, using one of the vulnerabilities described
in the Microsoft Bulletin MS04-028 creates such an account. This probably
mean that the remote host has been compromised by the use of this exploit.

See also : http://www.microsoft.com/technet/security/Bulletin/MS04-028.mspx
Solution : Re-install this host, as it has been compromised
Network Security Threat Level: Critical

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Dell Vostro 220s Motherboard P301D Core 2 Duo 3.00Ghz CPU Included
$21.99
Dell Vostro 220s Motherboard P301D Core 2 Duo 3.00Ghz CPU Included pictureDell Inspiron 15.6" 3531 Intel N2830 2.167Ghz Motherboard LA-B481P SR1W4 GLP*
$85.99
Dell Inspiron 15.6New 60pcs Mainboard Motherboard Screws For MacBook Pro Unibody A1278 A1286 A1297
$12.99
New 60pcs Mainboard Motherboard Screws For MacBook Pro Unibody A1278 A1286 A1297 pictureECS IC780M-A2 (V1.0A) AM3 AMD 770 ATX AMD Motherboard
$8.0
ECS IC780M-A2 (V1.0A) AM3 AMD 770 ATX AMD Motherboard picture


Discussions

No Discussions have been posted on this vulnerability.