Summary
This host is missing a critical security update according to Microsoft Bulletin MS11-083.
Impact
Successful exploitation could allow remote attacker to execute the arbitrary code in kernel mode. An attacker could then install programs, view, change, delete data or create new accounts with full user rights.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/bulletin/ms11-083.mspx
Insight
The flaw is due to an integer overflow error in the TCP/IP implementation when parsing UDP traffic and which can be exploited via a continuous flow of specially crafted UDP datagrams sent to a closed port.
Affected
Microsoft Windows 7 Service Pack 1 and prior
Microsoft Windows Vista Service Pack 2 and prior
Microsoft Windows Server 2008 Service Pack 2 and prior
References
Severity
Classification
-
CVE CVE-2011-2013 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Internet Explorer HTML Rendering Remote Memory Corruption Vulnerability (944533)
- Microsoft .NET Framework Remote Code Execution Vulnerability (2693777)
- Microsoft .NET Framework Privilege Elevation Vulnerability (3005210)
- Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (972270)
- Microsoft DirectShow Remote Code Execution Vulnerability (961373)