Summary
This host is missing an important security update according to Microsoft Bulletin MS13-101
Impact
Successful exploitation will allow remote attackers to cause a DoS (Denial of Service) and gain escalated privileges.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, https://technet.microsoft.com/en-us/security/bulletin/ms13-101
Insight
Multiple flaws are due to ,
- An error within the win32k.sys driver can be exploited to corrupt memory.
- A use-after-free error exists within the win32k.sys driver.
- An error when processing TrueType font files can be exploited to cause a crash.
- A double fetch error exists within the portcls.sys driver.
- An integer overflow error exists within the win32k.sys driver.
Affected
Microsoft Windows 8
Windows 8.1 x32/x64 Edition
Microsoft Windows Server 2012
Microsoft Windows XP x32 Edition Service Pack 3 and prior Microsoft Windows XP x64 Edition Service Pack 2 and prior Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Detection
Get the vulnerable file version and check appropriate patch is applied or not.
References
Severity
Classification
-
CVE CVE-2013-3899, CVE-2013-3902, CVE-2013-3903, CVE-2013-3907, CVE-2013-5058 -
CVSS Base Score: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Message Queuing Remote Code Execution Vulnerability (951071)
- Microsoft Active Directory LDAP Remote Code Execution Vulnerability (969805)
- Microsoft 'hxvz.dll' ActiveX Control Memory Corruption Vulnerability (948881)
- Microsoft Active Accessibility Remote Code Execution Vulnerability (2623699)
- Microsoft Groove Remote Code Execution Vulnerability (2494047)