Summary
This host is missing an critical security
update according to Microsoft Bulletin MS15-011.
Impact
Successful exploitation will allow
context-dependent to execute arbitrary code. Failed exploit attempts will result in a denial-of-service condition.
Impact Level: System
Solution
Run Windows Update and update the
listed hotfixes or download and update mentioned hotfixes in the advisory from the below link,
https://technet.microsoft.com/library/security/MS15-011
Insight
The flaw is due to remote code execution
vulnerability in the way Group Policy receives and applies policy data if a domain-joined system is connected to a domain controller
Affected
Microsoft Windows 2003 x32/x64 Edition Service Pack 2 Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior Microsoft Windows Server 2008 x32 Edition Service Pack 2 Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 Microsoft Windows Server 2008 x64 Edition Service Pack 2 Microsoft Windows 7 x32/x64 Edition Service Pack 1 Microsoft Windows 8 x32/x64
Microsoft Windows 8.1 x32/x64 Edition
Microsoft Windows Server 2012/2012R2
Detection
Get the vulnerable file version and
check appropriate patch is applied or not.
References
Severity
Classification
-
CVE CVE-2015-0008 -
CVSS Base Score: 8.3
AV:A/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Internet Information Services (IIS) FTP Service Remote Code Execution Vulnerability (2489256)
- Microsoft IIS Authentication Remote Code Execution Vulnerability (982666)
- Buffer Overrun in the ListBox and in the ComboBox (824141)
- Cumulative Security Update for Internet Explorer (961260)
- Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2265906)