Summary
The host is installed with Microsoft Windows operating system and is prone to pivilege escalation vulnerability.
This NVT has been replaced by NVT secpod_ms11-087.nasl (OID:1.3.6.1.4.1.25623.1.0.902767).
Impact
Successful exploitation could allow attackers to execute arbitrary code with kernel-level privileges. Failed exploit attempts may result in a denial-of-service condition.
Impact Level: System
Solution
Apply the workaround from below link,
http://support.microsoft.com/kb/2639658
Insight
The flaw is due to due to an error within the Win32k kernel-mode driver when parsing TrueType fonts.
Affected
Microsoft Windows 7 Service Pack 1 and prior
Microsoft Windows XP Service Pack 3 and prior
Microsoft Windows Vista Service Pack 2 and prior
Microsoft Windows Server 2008 Service Pack 2 and prior Microsoft Windows server 2003 Service Pack 2 and prior
References
Severity
Classification
-
CVE CVE-2011-3402 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Sidebar and Gadgets Remote Code Execution Vulnerability (2719662)
- MS Windows Insecure Library Loading Remote Code Execution Vulnerabilities (2269637)
- SMB Registry : SQL7 Patches
- MS Internet Explorer 'VBScript' Remote Code Execution Vulnerability
- Microsoft Windows NSlookup.exe Remote Code Execution Vulnerability