Summary
This host is missing a critical security update according to Microsoft Bulletin MS10-032.
Impact
Successful exploitation could allow attackers to execute arbitrary code with kernel privileges.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/bulletin/ms10-032.mspx
Insight
The flaws are due to an error in the kernel-mode device driver 'Win32k.sys', which - does not properly validate changes in certain 'kernel objects'.
- does not properly validate all callback parameters when creating a 'new window' or
- when providing 'glyph' outline information to applications.
Affected
Micorsoft Windows 7
Microsoft Windows 2K Service Pack 4 and prior.
Microsoft Windows XP Service Pack 3 and prior.
Microsoft Windows 2K3 Service Pack 2 and prior.
Microsoft Windows Vista Service Pack 1/2 and prior.
Microsoft Windows Server 2008 Service Pack 1/2 and prior.
References
Severity
Classification
-
CVE CVE-2010-0484, CVE-2010-0485, CVE-2010-1255 -
CVSS Base Score: 6.8
AV:L/AC:L/Au:S/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Windows Media Center Remote Code Execution Vulnerability (2978742)
- Microsoft Remote Desktop Tampering Vulnerability (2969259)
- Microsoft .NET Framework Remote Code Execution Vulnerability (2538814)
- Microsoft MS00-058 security check
- Microsoft Active Directory Federation Services Information Disclosure Vulnerability (2873872)