Nicolas, >From http://www.microsoft.com/technet/security/Bulletin/MS07-028.mspx, -> [Vulnerability Details] -> [CAPICOM.Certificates Vulnerability - CVE-2007-0940] -> [FAQ for CAPICOM.Certificates Vulnerability - CVE-2007-0940]:
EXCERPT (BEGIN) Why is the old version of CAPICOM.dll still on the system after installing this security update? Users may have installed CAPICOM.dll from a source other than Microsoft. CAPICOM.dll may have been installed by a non-Microsoft product. Since the security update cannot determine where the previous CAPICOM.dll version originated, it is left on the system for application compatibility. The previous version does not leave your system vulnerable to this vulnerability. EXCERPT (END) I don't know if this FAQ item applies or not; the Company attribute is "Microsoft Corporation." I doubt it's a custom CAPICOM (e.g., from Citrix) because even my desktop computer has CAPICOM 2.0.0.3, and the patch has been applied to it as well. But the MS bulletin definitely says, "If you have version 2.1.01 or lower, you should update your system," so Nessus is correct in marking it as a vulnerability. Something must be broken in the Microsoft patch. John -----Original Message----- From: John Scherff Sent: Monday, June 04, 2007 10:37 AM To: 'Nicolas Pouvesle'; nessus Cc: Rob Slayden Subject: RE: FALSE POSITIVE Nicolas, The file is at 2.0.0.3 - a vulnerable version. Very strange. I double-checked with MBSA 2.0.1 and it doesn't find any problems, either. Let me dig a little deeper. John -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Nicolas Pouvesle Sent: Monday, June 04, 2007 8:52 AM To: nessus Subject: Re: FALSE POSITIVE On Jun 4, 2007, at 5:10 PM, John Scherff wrote: > Plugin 25167 appears to be producing false-positives. This plugin is > in the "Windows : Microsoft Bulletins" family and tests for > MS07-028 (flaw in CAPICOM). > > The scan was run against a freshly-installed, fully-patched Windows > 2003 R2 server with Citrix Presentation Server 4.5 installed. > Could you check the default value in the following registry key ? value = SOFTWARE\Classes\CAPICOM.Certificates\CLSID Then get the path in : "SOFTWARE\Classes\CLSID\"+value+"\InprocServer32" and finally check the version of the file pointed by the previous registry key. If this version is smaller than 2.1.0.2 then your server is vulnerable (it is possible to access this activex). Nicolas _______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus _______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
