Summary
This host is missing a critical security update according to Microsoft Bulletin MS09-065.
Impact
Successful exploitation could allow attackers to remote attackers to compromise a vulnerable system or by local attackers to gain elevated privileges.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/bulletin/ms09-065.mspx
Insight
- An error in the Win32k kernel-mode driver 'Win32k.sys' when parsing font code can be exploited to execute arbitrary code if a user views content rendered in a specially crafted Embedded OpenType (EOT) font, when a user visits a malicious web site.
- Some vulnerabilities in the Win32k kernel-mode driver can be exploited by malicious, local users to gain escalated privileges.
- An error in the Win32k kernel-mode driver 'Win32k.sys' when handling input passed through the kernel component of GDI (Graphics Device Interface) can be exploited to execute arbitrary code in kernel mode.
Affected
Microsoft Windows 2K Service Pack 4 and prior.
Microsoft Windows XP Service Pack 3 and prior.
Microsoft Windows 2K3 Service Pack 2 and prior.
Microsoft Windows Vista Service Pack 1/2 and prior.
Microsoft Windows Server 2008 Service Pack 1/2 and prior.
References
Severity
Classification
-
CVE CVE-2009-1127, CVE-2009-2513, CVE-2009-2514 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Cumulative Security Update for Internet Explorer (931768)
- Microsoft Comctl32 Integer Overflow Vulnerability (2864058)
- Microsoft .NET Framework Remote Code Execution Vulnerabilities (2878890)
- Microsoft Excel Remote Code Execution Vulnerabilities (968557)
- Microsoft Internet Explorer HTML Rendering Remote Memory Corruption Vulnerability (944533)