Summary
This host is missing a critical security update according to Microsoft Bulletin MS14-035.
Impact
Successful exploitation will allow attackers to conduct session hijacking attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, https://technet.microsoft.com/en-us/security/bulletin/ms14-035
Insight
Multiple flaws are due to,
- A use-after-free error when handling CMarkup objects.
- An error when handling negotiation of certificates during a TLS session.
- Improper validation of certain permissions.
- and multiple Unspecified errors.
Affected
Microsoft Internet Explorer version 6.x/7.x/8.x/9.x/10.x/11.x
Detection
Get the vulnerable file version and check appropriate patch is applied or not.
References
Severity
Classification
-
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Checks for MS HOTFIX for snmp buffer overruns
- Host Integration Server RPC Service Remote Code Execution Vulnerability (956695)
- Microsoft .NET Framework Authentication Bypass and Spoofing Vulnerabilities (2836440)
- Microsoft Wireless LAN AutoConfig Service Remote Code Execution Vulnerability (970710)
- Microsoft IIS Authentication Remote Code Execution Vulnerability (982666)