Summary
This host is missing an important security update according to Microsoft Bulletin MS12-001.
Impact
Successful exploitation could allow attackers to execute arbitrary code by leveraging memory corruption vulnerabilities in Windows applications.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms12-001
Insight
The flaw is due to an error in the way the kernel (ntdll.dll) loads structured exception handling tables and allows bypassing the SafeSEH security mechanism. This facilitates easier exploitation of other vulnerabilities in affected applications to execute code.
Affected
Micorsoft Windows 7 Service Pack 1 and prior.
Microsoft Windows 2003 Service Pack 2 and prior.
Microsoft Windows Vista Service Pack 2 and prior.
Microsoft Windows Server 2008 Service Pack 2 and prior.
References
Severity
Classification
-
CVE CVE-2012-0001 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Group Policy Remote Code Execution Vulnerability (3000483)
- Microsoft Ancillary Function Driver Elevation of Privilege Vulnerability (956803)
- Buffer Overrun In HTML Converter Could Allow Code Execution (823559)
- Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2514842)
- Microsoft .NET Framework Remote Code Execution Vulnerability (2745030)