Summary
This host is missing a critical security update according to Microsoft Bulletin MS12-039.
Impact
Successful exploitation could allow an attacker to execute arbitrary code with kernel-level privileges. Failed exploit attempts may result in a denial of service condition.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms12-039
Insight
- An error within the Win32k kernel-mode driver (win32k.sys) when parsing TrueType fonts.
- An error in the t2embed.dll module when parsing TrueType fonts.
- The client loads libraries in an insecure manner, which can be exploited to load arbitrary libraries by tricking a user into opening a '.ocsmeet' file located on a remote WebDAV or SMB share.
- An unspecified error in the 'SafeHTML' API when sanitising HTML code can be exploited to execute arbitrary HTML and script code in the user's chat session.
Affected
Microsoft Lync 2010
Microsoft Lync 2010 Attendee
Microsoft Lync 2010 Attendant
Microsoft Communicator 2007 R2
References
Severity
Classification
-
CVE CVE-2011-3402, CVE-2012-0159, CVE-2012-1849, CVE-2012-1858 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Internet Explorer Vector Markup Language Remote Code Execution Vulnerability (2544521)
- ADODB.Stream object from Internet Explorer (KB870669)
- Cumulative Security Update for Internet Explorer (939653)
- Microsoft Internet Explorer Data Stream Handling Remote Code Execution Vulnerability (947864)
- Cumulative Security Update for Internet Explorer (956390)