Vulnerabilities > CVE-2011-2016 - Unspecified vulnerability in Microsoft Windows 7, Windows Server 2008 and Windows Vista
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
Untrusted search path vulnerability in Windows Mail and Windows Meeting Space in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .eml or .wcinv file, aka "Windows Mail Insecure Library Loading Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 9 |
Msbulletin
bulletin_id | MS11-085 |
bulletin_url | |
date | 2011-11-08T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 2620704 |
knowledgebase_url | |
severity | Important |
title | Vulnerability in Windows Mail and Windows Meeting Space Could Allow Remote Code Execution |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS11-085.NASL |
description | The remote Windows host is missing an security update. It is, therefore, affected by a flaw in Windows Mail and Windows Meeting Space related to the search path that is used when loading dynamic link library (DLL) files. This path may include directories that are not trusted or under user control. An unauthenticated, remote attacker can exploit this, by inserting a crafted Trojan horse DLL file into the search path, to execute arbitrary code with privileges of the user. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 56738 |
published | 2011-11-08 |
reporter | This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/56738 |
title | MS11-085: Vulnerability in Windows Mail and Windows Meeting Space Could Allow Remote Code Execution (2620704) |
code |
|
Oval
accepted | 2014-06-30T04:04:43.615-04:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
description | Untrusted search path vulnerability in Windows Mail and Windows Meeting Space in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .eml or .wcinv file, aka "Windows Mail Insecure Library Loading Vulnerability." | ||||||||||||||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:14028 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||||||||||||||
submitted | 2011-11-08T13:00:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
title | Windows Mail Insecure Library Loading Vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||
version | 28 |
Seebug
bulletinFamily | exploit |
description | CVE ID: CVE-2011-2016 Microsoft Windows是流行的计算机操作系统。 Microsoft Windows在实现上存在安全漏洞,可被恶意用户利用控制受影响系统。 此漏洞源于Windows Mail和Windows Meeting Space以不安全方式加载某些库,通过诱使用户打开远程WebDAV或SMB共享上的EML或WCLNV文件加载任意库。 0 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows 7 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS11-085)以及相应补丁: MS11-085:Vulnerability in Windows Mail and Windows Meeting Space Could Allow Remote Code Execution (2620704) 链接:http://www.microsoft.com/technet/security/bulletin/MS11-085 .asp |
id | SSV:23180 |
last seen | 2017-11-19 |
modified | 2011-11-09 |
published | 2011-11-09 |
reporter | Root |
title | Windows Mail/Meeting Space不安全库加载漏洞(MS11-085) |