Solved

Microsoft Vbasic 6.0 runtime extended files

Posted on 2009-04-10
6
684 Views
Last Modified: 2012-05-06
Running Retina on a govvie network.  I keep popping high risk vulnerabilities due to visual basic 6 extended files.  The hits reference MS security bulletin ms08-070.  Unfortunately I am not running any of the pgms noted in that article on my network.  The files that seem to be affected are msmask32.ocx and mscomct2.ocx.  Current version of those files is 6.0.84.18.  From what I can glean from the interwebs, I need version 6.1.98.12.  Of course microsoft does not offer any of those files alone and I don't know of a way to pull those files out of the MSI's for the aforementioned programs.  Can anyone verify the vulnerability and help me out with a suggestion on how to mitigate this?
0
Comment
Question by:whitman911
  • 3
  • 2
6 Comments
 
LVL 12

Accepted Solution

by:
jahboite earned 500 total points
ID: 24129470
There's a similar question at http://www.experts-exchange.com/Security/Vulnerabilities/Q_24199174.html and I wonder if the answer I gave there is any help to you.  The asker of that question hasn't yet responded to my answer, but I've asked for an update so it might be worth "Monitoring" that question for any extra information they might share.
0
 

Author Comment

by:whitman911
ID: 24131798
Jahboite,

I read the post you directed me to.  I was afraid that this might be the case, so I have a lot of fun ahead of me researching each and every program on each of my machines.  D-=

Thank you for the assist.
0
 

Author Comment

by:whitman911
ID: 24131822
Jahboit,

As a further inquiry on this issue, is there ANYWHERE I can pull the files I am needing from the VB6 dev. env?
0
 
LVL 12

Expert Comment

by:jahboite
ID: 24138185
0
 

Author Comment

by:whitman911
ID: 24309650
Sorrym I stopped monitoring this one.  There is apparently no solution for this.  I am actually just reimaging the machines in question and calling it good.  :)  Thanks Jah
0

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now