Summary
This host is missing an important security update according to Microsoft Bulletin MS13-042.
Impact
Successful exploitation could allow attackers to execute arbitrary code by tricking a user into opening a specially crafted publisher files.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms13-042
Insight
Multiple flaws are due to,
- An unspecified errors when handling array size, return values, table range data, NULL values.
- An integer overflow vulnerability exists.
- A signedness error exists when parsing certain data, which can be exploited to corrupt memory.
Affected
Microsoft Publisher 2003 Service Pack 3 and prior
Microsoft Publisher 2007 Service Pack 3 and prior
Microsoft Publisher 2010 Service Pack 1 and prior
References
Severity
Classification
-
CVE CVE-2013-1316, CVE-2013-1317, CVE-2013-1318, CVE-2013-1319, CVE-2013-1320, CVE-2013-1321, CVE-2013-1322, CVE-2013-1323, CVE-2013-1327, CVE-2013-1328, CVE-2013-1329 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Wireless LAN AutoConfig Service Remote Code Execution Vulnerability (970710)
- Microsoft 'hxvz.dll' ActiveX Control Memory Corruption Vulnerability (948881)
- Cumulative Security Update for Internet Explorer (972260)
- Microsoft .NET Framework Remote Code Execution Vulnerability (2706726)
- IE 5.01 5.5 6.0 Cumulative patch (890923)