Summary
The host is installed Microsoft Windows Progman Group Converter and is prone to insecure library loading vulnerability.
Impact
Successful exploitation could allow attackers to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse 'imm.dll'.
Impact Level: System
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
A workaround is given in the below link,
http://support.microsoft.com/default.aspx?scid=kb
EN-US
2264107
Insight
The flaw is due to Windows Progman Group Converter (grpconv.exe) which loads libraries in an insecure manner.
Affected
Microsoft Windows XP Service Pack 3 and prior
Microsoft Windows 23 Service Pack 2 and prior
Microsoft Windows 2000 Service Pack 4 and prior
References
Severity
Classification
-
CVE CVE-2010-3139 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Windows DNS Devolution Third-Level Domain Name Resolving Weakness (971888)
- Microsoft EAP Implementation TLS Information Disclosure Vulnerability (2977292)
- MS Windows Insecure Library Loading Remote Code Execution Vulnerabilities (2269637)
- Computer Associates WebScan ActiveX Control Multiple Remote Code Execution Vulnerabilities
- Microsoft Organization Chart Remote Code Execution Vulnerability