Summary
This host is missing an important security update according to Microsoft Security Advisory (2854544).
Impact
Successful exploitation could allow remote attackers to perform man-in-the-middle attack during a Windows Update session that basically redirects the user's machine to a phony update with the malware.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/advisory/2854544
Insight
The flaw is due to a Flame modules named 'Gadget' and 'Munch', used to infect other machines in the same network as the targeted machine.
Affected
Microsoft Windows 8
Microsoft Windows Server 2012
Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
References
Severity
Classification
-
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Microsoft Windows Minimum Certificate Key Length Spoofing Vulnerability (2661254)
- Microsoft .NET Framework Security Bypass Vulnerability
- MS Windows HID Functionality(Over USB) Code Execution Vulnerability
- Opera web browser large javaScript array handling vulnerability
- Microsoft .NET '__VIEWSTATE' Cross-Site Scripting vulnerability