Hi,

Attached is a credential-based plugin which makes sure that the remote hosts have executed the Microsoft regsvr32 workaround for the VML vulnerability[1]


This plugin won't be put in any plugin feed, but we figured that it may be of some interest to some of you who did execute the MS workaround.



                                -- Renaud


[1] regsvr32 -u "%ProgramFiles%\Common Files\Microsoft Shared\VGX \vgx.dll"
    (cf http://www.microsoft.com/technet/security/advisory/925568.mspx)

Attachment: smb_nt_vml_workaround.nasl
Description: Binary data

_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to