Summary
This host is missing a important security update according to Microsoft Bulletin MS13-092.
Impact
Successful exploitation allows guest OS users to execute arbitrary code in all guest OS instances, and allows guest OS users to cause a denial of service (host OS crash) via a guest-to-host hypercall with a crafted function parameter
Impact Level: Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, https://technet.microsoft.com/en-us/security/bulletin/ms13-092
Insight
The issue is triggered when handling the value of a data structure, allowing a memory address with an invalid address to be used.
Affected
Microsoft Windows Server 2012
Microsoft Windows 8 x64 Edition
Detection
Get the vulnerable file version and check appropriate patch is applied or not.
References
Severity
Classification
-
CVE CVE-2013-3898 -
CVSS Base Score: 7.9
AV:A/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (961371))
- Microsoft Excel Could Allow Remote Code Execution Vulnerabilities (954066)
- Cumulative Security Update for Internet Explorer (928090)
- Microsoft DNS Resolution Remote Code Execution Vulnerability (2509553)
- Microsoft DHTML Editing Component ActiveX Remote Code Execution Vulnerability (956844)