Summary
This host is missing an important security update according to Microsoft Bulletin MS13-102.
Impact
Successful exploitation will allow attackers to execute arbitrary code and take complete control of an affected system.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms13-102
Insight
The flaw is due to an unspecified error within the LRPC client and can be exploited to cause a stack-based buffer overflow by sending a specially crafted LPC (Local Procedure Call) port message via a customised LRPC server.
Affected
Microsoft Windows XP Service Pack 3 and prior
Microsoft Windows XP x64 Edition Service Pack 2 and prior Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
Detection
Get the vulnerable file version and check appropriate patch is applied or not.
References
Severity
Classification
-
CVE CVE-2013-3878 -
CVSS Base Score: 6.9
AV:L/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Windows DirectWrite Denial of Service Vulnerability (2665364)
- Microsoft Windows Search Script Execution Vulnerability (963093)
- Microsoft Windows Digital Signatures Denial of Service Vulnerability (2868626)
- Microsoft .NET Framework Chart Control Information Disclosure Vulnerability (2567943)
- Microsoft OneNote Information Disclosure Vulnerability (2816264)