Nicolas,

>From http://www.microsoft.com/technet/security/Bulletin/MS07-028.mspx,
-> [Vulnerability Details] -> [CAPICOM.Certificates Vulnerability -
CVE-2007-0940] -> [FAQ for CAPICOM.Certificates Vulnerability -
CVE-2007-0940]:

EXCERPT (BEGIN)
Why is the old version of CAPICOM.dll still on the system after
installing this security update? 
Users may have installed CAPICOM.dll from a source other than Microsoft.
CAPICOM.dll may have been installed by a non-Microsoft product. Since
the security update cannot determine where the previous CAPICOM.dll
version originated, it is left on the system for application
compatibility. The previous version does not leave your system
vulnerable to this vulnerability.
EXCERPT (END) 

I don't know if this FAQ item applies or not; the Company attribute is
"Microsoft Corporation."  I doubt it's a custom CAPICOM (e.g., from
Citrix) because even my desktop computer has CAPICOM 2.0.0.3, and the
patch has been applied to it as well.

But the MS bulletin definitely says, "If you have version 2.1.01 or
lower, you should update your system," so Nessus is correct in marking
it as a vulnerability.  Something must be broken in the Microsoft patch.

John

-----Original Message-----
From: John Scherff 
Sent: Monday, June 04, 2007 10:37 AM
To: 'Nicolas Pouvesle'; nessus
Cc: Rob Slayden
Subject: RE: FALSE POSITIVE

Nicolas,

The file is at 2.0.0.3 - a vulnerable version.  Very strange. I
double-checked with MBSA 2.0.1 and it doesn't find any problems, either.
Let me dig a little deeper.  

John

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Nicolas Pouvesle
Sent: Monday, June 04, 2007 8:52 AM
To: nessus
Subject: Re: FALSE POSITIVE


On Jun 4, 2007, at 5:10 PM, John Scherff wrote:

> Plugin 25167 appears to be producing false-positives.  This plugin is 
> in the "Windows : Microsoft Bulletins" family and tests for
> MS07-028 (flaw in CAPICOM).
>
> The scan was run against a freshly-installed, fully-patched Windows
> 2003 R2 server with Citrix Presentation Server 4.5 installed.
>

Could you check the default value in the following registry key ?

value = SOFTWARE\Classes\CAPICOM.Certificates\CLSID

Then get the path in :

"SOFTWARE\Classes\CLSID\"+value+"\InprocServer32"

and finally check the version of the file pointed by the previous
registry key. If this version is smaller than 2.1.0.2 then your server
is vulnerable (it is possible to access this activex).


Nicolas
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to