Summary
This host is prone to Remote Code Execution vulnerabilities.
Impact
Successful exploitation will allow attackers to execute arbitrary code or to elevate privileges.
Impact Level: Application.
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, htttp://www.microsoft.com/technet/security/advisory/2269637.mspx
Insight
The flaws are due to:
- An error in the loading of dynamic link libraries (DLLs). If an application does not securely load DLL files, an attacker may be able to cause the application to load an arbitrary library.
- A specific insecure programming practices that allow so-called 'binary planting' or 'DLL preloading attacks', which allows the attacker to execute arbitrary code in the context of the user running the vulnerable application when the user opens a file from an untrusted location.
Affected
Micorsoft Windows 7
Microsoft Windows XP Service Pack 3 and prior
Microsoft Windows 2003 Service Pack 2 and prior
Microsoft Windows Vista Service Pack 2 and prior.
Microsoft Windows Server 2008 Service Pack 2 and prior.
References
Updated on 2017-03-28
Severity
Classification
-
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Office Excel 2003 Invalid Object Type Remote Code Execution Vulnerability
- Internet Explorer version check
- Update to Improve Credentials Protection and Management (2871997)
- Microsoft Windows Indeo Codec Multiple Vulnerabilities
- Microsoft Windows TrueType Font Parsing Privilege Elevation Vulnerability