Summary
This host is missing a critical security update according to Microsoft Bulletin MS12-052.
Impact
Successful exploitation could allow remote attackers to execute arbitrary code in the context of the of the current user.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms12-052
Insight
- An error in the layout handling when accessing an improperly initialized or deleted object can be exploited to corrupt memory.
- A use-after-free error when asynchronously accessing NULL objects can be exploited to dereference an already deleted object.
- An error may cause a corrupted virtual function table that has already been deleted to be accessed.
- An integer overflow error in the JavaScript parsing when calculating the size of an object in memory during a copy operation can be exploited to corrupt memory.
Affected
Microsoft Internet Explorer version 6.x/7.x/8.x/9.x
References
Severity
Classification
-
CVE CVE-2012-1526, CVE-2012-2521, CVE-2012-2522, CVE-2012-2523 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Comctl32 Integer Overflow Vulnerability (2864058)
- Microsoft Wireless LAN AutoConfig Service Remote Code Execution Vulnerability (970710)
- Microsoft DirectShow Remote Code Execution Vulnerability (977935)
- Checks for MS HOTFIX for snmp buffer overruns
- Microsoft Internet Explorer Data Stream Handling Remote Code Execution Vulnerability (947864)