Summary
This host is missing an important security update according to Microsoft Bulletin MS14-002
Impact
Successful exploitation will allow remote attackers to gain escalated privileges.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, https://technet.microsoft.com/en-us/security/bulletin/ms14-002
Insight
The flaw is due to an input validation error within the NDPROXY (NDProxy.sys) kernel component and can be exploited to execute arbitrary code with kernel privileges.
Affected
Microsoft Windows XP x32 Edition Service Pack 3 and prior Microsoft Windows XP x64 Edition Service Pack 2 and prior Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
Detection
Get the vulnerable file version and check appropriate patch is applied or not.
References
Severity
Classification
-
CVE CVE-2013-5065 -
CVSS Base Score: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2265906)
- Microsoft Comctl32 Integer Overflow Vulnerability (2864058)
- Microsoft Distributed File System Remote Code Execution Vulnerabilities (2535512)
- Cumulative Security Update for Internet Explorer (937143)
- Message Queuing Remote Code Execution Vulnerability (951071)