Summary
This host is missing a critical security update according to Microsoft Bulletin MS12-039.
Impact
Successful exploitation could allow an attacker to execute arbitrary code with kernel-level privileges. Failed exploit attempts may result in a denial of service condition.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms12-039
Insight
- An error within the Win32k kernel-mode driver (win32k.sys) when parsing TrueType fonts.
- An error in the t2embed.dll module when parsing TrueType fonts.
- The client loads libraries in an insecure manner, which can be exploited to load arbitrary libraries by tricking a user into opening a '.ocsmeet' file located on a remote WebDAV or SMB share.
- An unspecified error in the 'SafeHTML' API when sanitising HTML code can be exploited to execute arbitrary HTML and script code in the user's chat session.
Affected
Microsoft Lync 2010
Microsoft Lync 2010 Attendee
Microsoft Lync 2010 Attendant
Microsoft Communicator 2007 R2
References
Severity
Classification
-
CVE CVE-2011-3402, CVE-2012-0159, CVE-2012-1849, CVE-2012-1858 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft .NET Framework and Microsoft Silverlight Remote Code Execution Vulnerabilities (2651026)
- Microsoft Internet Explorer Data Stream Handling Remote Code Execution Vulnerability (947864)
- Microsoft Active Accessibility Remote Code Execution Vulnerability (2623699)
- Consent User Interface Privilege Escalation Vulnerability (2442962)
- Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2604930)