Summary
This host is missing a critical security update according to Microsoft Bulletin MS12-016.
Impact
Successful exploitation could allow attacker to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely result in a denial-of-service condition.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms12-016
Insight
Multiple flaws are due to
- An unspecified error when handling un-managed objects can be exploited via a specially crafted XAML Browser Application (XBAP).
- An error when calculating certain buffer lengths can be exploited to corrupt memory via a specially crafted XAML Browser Application (XBAP).
Affected
Microsoft Silverlight 4.0
Microsoft .NET Framework 4.0
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 2.0 Service Pack 2
References
Severity
Classification
-
CVE CVE-2012-0014, CVE-2012-0015 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Foundation Class (MFC) Library Remote Code Execution Vulnerability (2500212)
- Message Queuing Remote Code Execution Vulnerability (951071) - Remote
- Microsoft GDI+ Remote Code Execution Vulnerability (2489979)
- ADODB.Stream object from Internet Explorer (KB870669)
- Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability (2387149)