Summary
This host is missing a critical security
update according to Microsoft Bulletin MS15-002.
Impact
Successful exploitation could allow remote
attackers to compromise the affected system.
Impact Level: System
Solution
Run Windows Update and update the
listed hotfixes or download and update mentioned hotfixes in the advisory from the below link,
https://technet.microsoft.com/library/security/MS15-002
Insight
The flaw is triggered as user-supplied input
is not properly validated. With a specially crafted telnet packet, a remote attacker can cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.
Affected
Microsoft Windows 8 x32/x64
Microsoft Windows Server 2012/R2
Microsoft Windows 8.1 x32/x64 Edition
Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
Detection
Get the vulnerable file version and
check appropriate patch is applied or not.
References
Severity
Classification
-
CVE CVE-2015-0014 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft .NET Framework Remote Code Execution Vulnerability (3000414)
- Microsoft Internet Explorer mshtml.dll Remote Memory Corruption Vulnerability (942615)
- Microsoft IIS FTP Service Remote Code Execution Vulnerabilities (975254)
- Microsoft Foundation Class (MFC) Library Remote Code Execution Vulnerability (2500212)
- Microsoft .NET Framework Authentication Bypass and Spoofing Vulnerabilities (2836440)