Microsoft Windows Data Access Components Remote Code Execution Vulnerabilities (2451910)

Summary
This host is missing a critical security update according to Microsoft Bulletin MS11-002.
Impact
Successful exploitation will allow the attacker to execute arbitrary code on the targeted system. Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/Bulletin/MS11-002.mspx
Insight
The flaws are due to: - A buffer overflow error in the Data Source Name (DSN) argument of an Open Database Connectivity (ODBC) API that may be used by third-party applications, which could allow attackers to execute arbitrary code by convincing a user to visit a specially crafted web page. - A memory corruption error in the Microsoft Data Access Components (MDAC) when handling internal data structures, which could be exploited by remote attackers to execute arbitrary code via a specially crafted web page.
Affected
Micorsoft Windows 7 Microsoft Windows XP Service Pack 3 and prior. Microsoft Windows 2K3 Service Pack 2 and prior. Microsoft Windows Vista Service Pack 2 and prior. Microsoft Windows Server 2008 Service Pack 2 and prior.
References