Summary
This host is missing an important security update according to Microsoft Bulletin MS13-017.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code with kernel-mode privileges.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms13-017
Insight
- Race condition errors when handling certain objects in memory can be exploited to execute arbitrary code with kernel privileges.
- An error when handling the reference counter for certain objects in memory can be exploited to execute arbitrary code with kernel privileges.
Affected
Microsoft Windows XP x32 Edition Service Pack 3 and prior Microsoft Windows XP x64 Edition Service Pack 2 and prior Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
References
Severity
Classification
-
CVE CVE-2013-1278, CVE-2013-1279, CVE-2013-1280 -
CVSS Base Score: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft .NET Framework Remote Code Execution Vulnerability (2671605)
- Microsoft DirectShow Remote Code Execution Vulnerability (2929961)
- Microsoft Wireless LAN AutoConfig Service Remote Code Execution Vulnerability (970710)
- Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability (2387149)
- Checks for MS HOTFIX for snmp buffer overruns