Summary
This host is missing a critical security update according to Microsoft Bulletin MS11-029.
Impact
Successful exploitation could allow remote attackers to execute arbitrary code via a specially crafted web page.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/Bulletin/MS11-029.mspx
Insight
The flaw is caused by an integer overflow error in the GDI+ library when processing malformed data.
Affected
Microsoft Windows XP x32 Edition Service Pack 3 and prior Microsoft Windows XP x64 Edition Service Pack 2 and prior Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
References
Severity
Classification
-
CVE CVE-2011-0041 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft .NET Common Language Runtime Code Execution Vulnerability (974378)
- .NET JIT Compiler Vulnerability
- Microsoft IIS FTP Service Remote Code Execution Vulnerabilities (975254)
- Microsoft .NET Framework Remote Code Execution Vulnerability (2693777)
- Consent User Interface Privilege Escalation Vulnerability (2442962)