Summary
This host is prone to Remote Code Execution vulnerabilities.
Impact
Successful exploitation will allow attackers to execute arbitrary code or to elevate privileges.
Impact Level: Application.
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, htttp://www.microsoft.com/technet/security/advisory/2269637.mspx
Insight
The flaws are due to:
- An error in the loading of dynamic link libraries (DLLs). If an application does not securely load DLL files, an attacker may be able to cause the application to load an arbitrary library.
- A specific insecure programming practices that allow so-called 'binary planting' or 'DLL preloading attacks', which allows the attacker to execute arbitrary code in the context of the user running the vulnerable application when the user opens a file from an untrusted location.
Affected
Micorsoft Windows 7
Microsoft Windows XP Service Pack 3 and prior
Microsoft Windows 2003 Service Pack 2 and prior
Microsoft Windows Vista Service Pack 2 and prior.
Microsoft Windows Server 2008 Service Pack 2 and prior.
References
Updated on 2017-03-28
Severity
Classification
-
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Windows Address Book Insecure Library Loading Vulnerability
- Microsoft EAP Implementation TLS Information Disclosure Vulnerability (2977292)
- Computer Associates WebScan ActiveX Control Multiple Remote Code Execution Vulnerabilities
- Microsoft Windows Server 2003 OpenType Font Engine DoS Vulnerability
- MS Windows Help and Support Center Remote Code Execution Vulnerability