MS.Step-By-Step.Interactive.Training.Buffer.Overflow

description-logoDescription

This indicates a possible attempt to exploit a buffer overflow vulnerability in the Step-by-Step Interactive Training in Microsoft Windows. The vulnerability is caused by an error that occurs when the vulnerable software handles malformed bookmark link files (i.e. "cbo", "cbl" or "cbm" files). It allows a remote attacker to execute arbitrary code.

affected-products-logoAffected Products

Microsoft Step-by-Step Interactive Training

Impact logoImpact

System Compromise

recomended-action-logoRecommended Actions

Update for Step-by-Step Interactive Training on Windows 2000 Service Pack 4 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=128c57af-663a-4476-92f5-aab394cfc91a
Update for Step-by-Step Interactive Training on Windows XP Service Pack 2 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=128c57af-663a-4476-92f5-aab394cfc91a
Update for Step-by-Step Interactive Training on Windows XP Professional x64 Edition :
http://www.microsoft.com/downloads/details.aspx?FamilyId=e268ffd5-295c-45f7-afd1-60007e791f8c
Update for Step-by-Step Interactive Training on Windows Server 2003 and Windows Server 2003 Service Pack 1 :
http://www.microsoft.com/downloads/details.aspx?FamilyId=128c57af-663a-4476-92f5-aab394cfc91a
Update for Step-by-Step Interactive Training on Windows Server 2003 (Itanium) and Windows Server 2003 SP1 (Itanium) :
http://www.microsoft.com/downloads/details.aspx?FamilyId=5eeedd28-47a5-4b30-a913-c1150330ecbe
Update for Step-by-Step Interactive Training on Windows Server 2003 x64 Edition :
http://www.microsoft.com/downloads/details.aspx?FamilyId=2760120e-96b2-42b2-b5df-6322c9385729

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-11-22 15.729 Name:MS.
Step.
By.
Step.
Interactive.
Training.
Buffer.
Overflow:MS.
Step-By-Step.
Interactive.
Training.
Buffer.
Overflow