Summary
This host is missing an important security update according to Microsoft Bulletin MS13-016.
Impact
Successful exploitation will allow remote attackers to a specially crafted program to exploit race conditions in 'win32k.sys' and gain System level privileges.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms13-016
Insight
The flaws due to an error in 'win32k.sys' when handling kernel-mode driver objects in memory.
Affected
Microsoft Windows XP x32 Edition Service Pack 3 and prior Microsoft Windows XP x64 Edition Service Pack 2 and prior Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
References
Severity
Classification
-
CVSS Base Score: 4.9
AV:L/AC:L/Au:N/C:C/I:N/A:N
Related Vulnerabilities
- Microsoft SharePoint Foundation Privilege Elevation Vulnerability (3000431)
- Microsoft Windows LSASS Denial of Service Vulnerability (975467)
- Buffer Overflow in Windows Troubleshooter ActiveX Control (826232)
- Flaw in SMB Signing Could Enable Group Policy to be Modified (329170)
- Microsoft .NET Framework Denial of Service Vulnerability (2990931)