Summary
This host is missing a critical security update according to Microsoft Bulletin MS11-019.
Impact
Successful exploitation could allow remote attacker to execute arbitrary code by creating a specially crafted browser message and sending the message to an affected system or attacker could perform a man-in-the-middle attack to respond to a legitimate SMB request with a malformed SMB response.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/Bulletin/MS11-019.mspx
Insight
The flaws are due to,
- errors in SMB client implementation which fails to validate specially crafted SMB responses.
- error in CIFS Browser Protocol implementation which fails to parse specially crafted Computer Browser messages causing memory corruption.
Affected
Micorsoft Windows 7 Service Pack 1 and prior
Microsoft Windows XP Service Pack 3 and prior
Microsoft Windows 2003 Service Pack 2 and prior
Microsoft Windows Vista Service Pack 1/2 and prior Microsoft Windows Server 2008 Service Pack 1/2 and prior
References
Severity
Classification
-
CVE CVE-2011-0654, CVE-2011-0660 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Excel Remote Code Execution Vulnerability (956416)
- Message Queuing Remote Code Execution Vulnerability (951071) - Remote
- IE 5.01 5.5 6.0 Cumulative patch (890923)
- Certificate Validation Flaw Could Enable Identity Spoofing (Q328145)
- Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability (2387149)