Summary
This host is missing an important security update according to Microsoft Bulletin MS13-036.
Impact
Successful exploitation will allow remote attackers to gain escalated privileges.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, https://technet.microsoft.com/en-us/security/bulletin/ms13-036
Insight
Multiple flaws are due to,
- Improper handling of certain objects in kernel memory.
- Improper parsing of crafted OpenType font files.
Affected
Microsoft Windows 8
Microsoft Windows Server 2012
Microsoft Windows XP x32 Edition Service Pack 3 and prior Microsoft Windows XP x64 Edition Service Pack 2 and prior Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
References
Severity
Classification
-
CVE CVE-2013-1283, CVE-2013-1291, CVE-2013-1292, CVE-2013-1293 -
CVSS Base Score: 7.1
AV:N/AC:M/Au:N/C:N/I:N/A:C
Related Vulnerabilities
- Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (972270)
- Microsoft Antimalware Client Privilege Elevation Vulnerability (2823482)
- Message Queuing Remote Code Execution Vulnerability (951071) - Remote
- Microsoft Filter Pack Remote Code Execution Vulnerability (2801261)
- Microsoft .NET Framework Privilege Elevation Vulnerability (2958732)