Summary
This host is missing a critical security update according to Microsoft Bulletin MS11-011.
Impact
Successful exploitation will allow remote attackers or malicious users to execute arbitrary code with kernel privileges.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/bulletin/ms11-011.mspx
Insight
The flaws are due to
- an integer truncation error in the Windows kernel that does not properly validate user-supplied data before allocating memory.
- a buffer overflow error in the 'win32k.sys' driver when interacting with the Windows kernel.
Affected
Microsoft Windows 7
Microsoft Windows XP Service Pack 3 and prior.
Microsoft Windows 2K3 Service Pack 2 and prior.
Microsoft Windows Vista Service Pack 2 and prior.
Microsoft Windows Server 2008 Service Pack 2 and prior.
References
Severity
Classification
-
CVE CVE-2010-4398, CVE-2011-0045 -
CVSS Base Score: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Antimalware Client Privilege Elevation Vulnerability (2823482)
- Microsoft DNS Resolution Remote Code Execution Vulnerability (2509553)
- Microsoft Internet Explorer Multiple Code Execution Vulnerabilities (974455)
- Microsoft Data Access Components Remote Code Execution Vulnerabilities (2560656)
- Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)