Summary
This host is missing a critical security update according to Microsoft Bulletin MS10-065.
Impact
Successful exploitation could allow remote attackers to bypass restrictions, create a denial of service condition or compromise a vulnerable web server.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/MS10-065
Insight
- a stack overflow error in the ASP script processing code when processing specially crafted URL requests sent to active server pages, which could be exploited to cause a denial of service.
- a buffer overflow error in the FastCGI module when processing malformed HTTP headers, which could be exploited by remote attackers to take complete control of the affected system via a specially crafted request.
- an error when processing specially crafted URLs, which could be exploited to bypass authentication.
Affected
Microsoft Windows 7
Microsoft Windows XP Service Pack 3 and prior.
Microsoft Windows 2K3 Service Pack 2 and prior.
Microsoft Windows Vista Service Pack 2 and prior.
Microsoft Windows Server 2008 Service Pack 2 and prior.
Microsoft Internet Information Services (IIS) version 5.1 Microsoft Internet Information Services (IIS) version 6.0 Microsoft Internet Information Services (IIS) version 7.0 Microsoft Internet Information Services (IIS) version 7.5
References
Severity
Classification
-
CVE CVE-2010-1899, CVE-2010-2730, CVE-2010-2731 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft DirectShow Remote Code Execution Vulnerability (961373)
- Microsoft DHTML Editing Component ActiveX Remote Code Execution Vulnerability (956844)
- Microsoft IIS FTP Service Remote Code Execution Vulnerabilities (975254)
- Microsoft .NET Framework Authentication Bypass and Spoofing Vulnerabilities (2836440)
- Consent User Interface Privilege Escalation Vulnerability (2442962)