Summary
This host is missing an important security update according to Microsoft Bulletin MS11-073.
Impact
Successful exploitation could allow attackers to execute arbitrary code as the logged-on user.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms11-073
Insight
- The flaw is due to the application loading libraries in an insecure manner when attempting to validate an opened file. This can be exploited to load arbitrary libraries by tricking a user into opening a PPT file located on a remote WebDAV or SMB share.
- An error when parsing unspecified data can be exploited to dereference an uninitialised value as an object pointer via a specially crafted Word document.
Affected
Microsoft Office 2003 Service Pack 3
Microsoft Office 2007 Service Pack 2
Microsoft Office 2010 Service Pack 1 and prior.
References
Severity
Classification
-
CVE CVE-2011-1980, CVE-2011-1982 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft IIS FTP Server 'Malformed FTP List Request' DOS Vulnerability
- Microsoft .NET Framework Multiple Vulnerabilities (2916607)
- Microsoft Groove Remote Code Execution Vulnerability (2494047)
- Flaw in Microsoft VM Could Allow Code Execution (810030)
- Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2604930)