Oval Definition:oval:org.mitre.oval:def:318
Revision Date:2011-05-09Version:45
Title:Folder GUID Code Execution Vulnerability
Description:Microsoft Internet Explorer 6.0 does not properly handle Drag and Drop events, which allows remote user-assisted attackers to execute arbitrary code via a link to an SMB file share with a filename that contains encoded ..\ (%2e%2e%5c) sequences and whose extension contains the CLSID Key identifier for HTML Applications (HTA), aka "Folder GUID Code Execution Vulnerability." NOTE: directory traversal sequences were used in the original exploit, although their role is not clear.
Family:windowsClass:vulnerability
Status:ACCEPTEDReference(s):CVE-2006-3281
Platform(s):Microsoft Windows 2000
Microsoft Windows Server 2003
Microsoft Windows XP
Product(s):
Definition Synopsis
  • Win2K,SP4
  • Microsoft Windows 2000 SP4 or later is installed
  • AND The version of shell32.dll is less than 5.0.3900.7105.
  • OR WinXP,SP1
  • Microsoft Windows XP SP1 (32-bit) is installed
  • AND The version of shell32.dll is less than 6.0.2800.1873.
  • OR WinXP,SP2
  • Microsoft Windows XP SP2 or later is installed
  • AND The version of shell32.dll is less than 6.0.2900.2951.
  • OR WinXP,SP1 (64-bit)
  • Microsoft Windows XP SP1 (64-bit) is installed
  • AND The version of shell32.dll is less than 6.0.3790.2746.
  • OR S03-Gold
  • Microsoft Windows Server 2003 (x86) Gold is installed
  • AND The version of shell32.dll is less than 6.0.3790.559.
  • OR S03,SP1
  • Microsoft Windows Server 2003 SP1 (x86) is installed
  • AND The version of shell32.dll is less than 6.0.3790.2746.
  • BACK