MS.Step-By-Step.Interactive.Training.Buffer.Overflow
Description
This indicates a possible attempt to exploit a buffer overflow vulnerability in the Step-by-Step Interactive Training in Microsoft Windows. The vulnerability is caused by an error that occurs when the vulnerable software handles malformed bookmark link files (i.e. "cbo", "cbl" or "cbm" files). It allows a remote attacker to execute arbitrary code.
Affected Products
Microsoft Step-by-Step Interactive Training
Impact
System Compromise
Recommended Actions
Update for Step-by-Step Interactive Training on Windows 2000 Service Pack 4 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=128c57af-663a-4476-92f5-aab394cfc91a
Update for Step-by-Step Interactive Training on Windows XP Service Pack 2 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=128c57af-663a-4476-92f5-aab394cfc91a
Update for Step-by-Step Interactive Training on Windows XP Professional x64 Edition :
http://www.microsoft.com/downloads/details.aspx?FamilyId=e268ffd5-295c-45f7-afd1-60007e791f8c
Update for Step-by-Step Interactive Training on Windows Server 2003 and Windows Server 2003 Service Pack 1 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=128c57af-663a-4476-92f5-aab394cfc91a
Update for Step-by-Step Interactive Training on Windows Server 2003 (Itanium) and Windows Server 2003 SP1 (Itanium) :
http://www.microsoft.com/downloads/details.aspx?FamilyId=5eeedd28-47a5-4b30-a913-c1150330ecbe
Update for Step-by-Step Interactive Training on Windows Server 2003 x64 Edition :
http://www.microsoft.com/downloads/details.aspx?FamilyId=2760120e-96b2-42b2-b5df-6322c9385729
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-11-22 | 15.729 | Name:MS. Step. By. Step. Interactive. Training. Buffer. Overflow:MS. Step-By-Step. Interactive. Training. Buffer. Overflow |