Summary
This host is missing a critical security update according to Microsoft Bulletin MS10-006.
Impact
Successful exploitation could allow remote attackers to crash an affected system or execute arbitrary code by tricking a user into visiting a specially crafted web page.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/bulletin/ms10-006.mspx
Insight
The flaws are due to pool corruption error in SMB client implementation. It is improperly validating fields in the SMB response.
Affected
Micorsoft Windows 7
Microsoft Windows 2000 Service Pack 4 and prior
Microsoft Windows XP Service Pack 3 and prior
Microsoft Windows 2003 Service Pack 2 and prior
Microsoft Windows Vista Service Pack 1/2 and prior.
Microsoft Windows Server 2008 Service Pack 1/2 and prior.
References
Severity
Classification
-
CVE CVE-2010-0016, CVE-2010-0017 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Comctl32 Integer Overflow Vulnerability (2864058)
- Microsoft .NET Framework Remote Code Execution Vulnerability (2745030)
- Buffer Overrun in Messenger Service (828035)
- Microsoft Internet Explorer Multiple Memory Corruption Vulnerabilities (2879017)
- Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2265906)