Summary
This host is missing an important security update according to Microsoft Bulletin MS14-047
Impact
Successful exploitation will allow remote attackers to bypass the ASLR security feature in conjunction with another vulnerability.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, https://technet.microsoft.com/library/security/MS14-047
Insight
The flaw is due to RPC improperly frees messages that the server rejects as malformed, allowing an attacker to fill up the address space of a process.
Affected
Microsoft Windows 8 x32/x64 Edition
Windows 8.1 x32/x64 Edition
Microsoft Windows Server 2012/R2
Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
Detection
Get the vulnerable file version and check appropriate patch is applied or not.
References
Severity
Classification
-
CVE CVE-2014-0316 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Microsoft .NET Framework Open Data Protocol DOS Vulnerability (2769327)
- Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)
- Microsoft Internet Explorer Multiple Code Execution Vulnerabilities (974455)
- Host Integration Server RPC Service Remote Code Execution Vulnerability (956695)
- Microsoft .NET Common Language Runtime Code Execution Vulnerability (974378)