Summary
This host is missing a critical security update according to Microsoft Bulletin MS08-032.
Impact
Successful exploitation will let the remote attackers execute commands on a victim user's computer.
Impact Level: System.
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/bulletin/ms08-032.mspx
Workaround:
Set the killbit for the following CLSIDs,
{47206204-5eca-11d2-960f-00c04f8ee628}, {3bee4890-4fe9-4a37-8c1e-5e7e12791c1f} http://support.microsoft.com/kb/240797
Insight
The flaw is caused by an error in the the Speech Components 'sapi.dll' when playing audio files in Internet Explorer, which could allow attackers to issue certain commands via a malicious audio file and execute arbitrary code on a system with the speech recognition feature activated and configured.
Affected
Microsoft Windows 2K Service Pack 4 and prior
Microsoft Windows XP Service Pack 3 and prior
Microsoft Windows 2K3 Service Pack 2 and prior
Microsoft Windows Vista Service Pack 1 and prior.
Microsoft Windows Server 2008 Service Pack 1/2 and prior.
References
Severity
Classification
-
CVE CVE-2007-0675 -
CVSS Base Score: 7.6
AV:N/AC:H/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Consent User Interface Privilege Escalation Vulnerability (2442962)
- Cumulative Security Update for Internet Explorer (953838)
- Microsoft .NET Framework Authentication Bypass and Spoofing Vulnerabilities (2836440)
- Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability (2387149)
- Microsoft Foundation Class (MFC) Library Remote Code Execution Vulnerability (2500212)