Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Windows >> Possible GDI+ compromise

Vulnerability Assessment Details

Possible GDI+ compromise

Vulnerability Assessment Summary
Logs in as user 'X' with no password

Detailed Explanation for this Vulnerability Assessment

It was possible to log into the remote host with the login 'X' and
a blank password.

A widely available exploit, using one of the vulnerabilities described
in the Microsoft Bulletin MS04-028 creates such an account. This probably
mean that the remote host has been compromised by the use of this exploit.

See also :
Solution : Re-install this host, as it has been compromised
Network Security Threat Level: Critical

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

PNY 1 GB DIMM 400 MHz DDR Memory (MD1024SD1400)
PNY 1 GB DIMM 400 MHz DDR Memory (MD1024SD1400) picture


No Discussions have been posted on this vulnerability.