Hi,
Attached is a credential-based plugin which makes sure that the
remote hosts have executed the Microsoft regsvr32 workaround for the
VML vulnerability[1]
This plugin won't be put in any plugin feed, but we figured that it
may be of some interest to some of you who did execute the MS
workaround.
-- Renaud
[1] regsvr32 -u "%ProgramFiles%\Common Files\Microsoft Shared\VGX
\vgx.dll"
(cf http://www.microsoft.com/technet/security/advisory/925568.mspx)
Attached is a credential-based plugin which makes sure that the
remote hosts have executed the Microsoft regsvr32 workaround for the
VML vulnerability[1]
This plugin won't be put in any plugin feed, but we figured that it
may be of some interest to some of you who did execute the MS
workaround.
-- Renaud
[1] regsvr32 -u "%ProgramFiles%\Common Files\Microsoft Shared\VGX
\vgx.dll"
(cf http://www.microsoft.com/technet/security/advisory/925568.mspx)