Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> Possible GDI+ compromise


Vulnerability Assessment Details

Possible GDI+ compromise

Vulnerability Assessment Summary
Logs in as user 'X' with no password

Detailed Explanation for this Vulnerability Assessment

It was possible to log into the remote host with the login 'X' and
a blank password.

A widely available exploit, using one of the vulnerabilities described
in the Microsoft Bulletin MS04-028 creates such an account. This probably
mean that the remote host has been compromised by the use of this exploit.

See also : http://www.microsoft.com/technet/security/Bulletin/MS04-028.mspx
Solution : Re-install this host, as it has been compromised
Network Security Threat Level: Critical

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Panasonic ToughBook CF-53 I5-2520M 2.5GHz 4GB RAM NO HDD
$250.0
Panasonic ToughBook CF-53 I5-2520M 2.5GHz 4GB RAM NO HDD picture4GB (2x2GB) DDR2 Kingston HyperX PC2-6400 (DDR2-800) NON-ECC Desktop RAM 2.0V
$15.99
4GB (2x2GB) DDR2 Kingston HyperX PC2-6400 (DDR2-800) NON-ECC Desktop RAM 2.0V pictureNEW 2 GB PC2-6400 PC6400 DDR2-800MH​Z 240pin Dimm Desktop Memory Non-ECC RAM #GV
$4.88
NEW 2 GB PC2-6400 PC6400 DDR2-800MH​Z 240pin Dimm Desktop Memory Non-ECC RAM #GV pictureCRUCIAL CT51264BC1067 RAM MEMORY 4GB|DDR3|204-PIN SODIMM
$19.99
CRUCIAL CT51264BC1067 RAM MEMORY 4GB|DDR3|204-PIN SODIMM picture


Discussions

No Discussions have been posted on this vulnerability.