Summary
This host is missing a critical security update according to Microsoft Bulletin MS12-081.
Impact
Successful exploitation could allow attacker to gain the same user rights as the current user by execute arbitrary code with system-level privileges.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/bulletin/ms12-081.mspx
Insight
The flaw is due to error in the File Handling component, which allow user browses to a folder that contains a file or sub folder names and can be exploited to corrupt memory via a file with a specially crafted filename.
Affected
Microsoft Windows XP x32 Edition Service Pack 3 and prior Microsoft Windows XP x64 Edition Service Pack 2 and prior Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
References
Severity
Classification
-
CVE CVE-2012-4774 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft .NET Framework Remote Code Execution Vulnerability (2671605)
- Microsoft .NET Framework Remote Code Execution Vulnerabilities (2878890)
- Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2514842)
- Cumulative Security Update for Internet Explorer (928090)
- Microsoft DirectShow Remote Code Execution Vulnerability (961373)