Summary
This host is missing a moderate security
update according to Microsoft Bulletin MS14-079.
Impact
Successful exploitation will allow an attacker
to conduct denial-of-service attack.
Impact Level: System
Solution
Run Windows Update and update the
listed hotfixes or download and update mentioned hotfixes in the advisory from the below link,
https://technet.microsoft.com/library/security/MS14-079
Insight
The flaw is due to an integer underflow error
in the 'vFill_IFIMETRICS' function within the win32k.sys module when processing font files.
Affected
Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior Microsoft Windows 8 x32/x64
Microsoft Windows 8.1 x32/x64 Edition
Microsoft Windows Server 2012/R2
Detection
Get the vulnerable file version and
check appropriate patch is applied or not.
References
Severity
Classification
-
CVE CVE-2014-6317 -
CVSS Base Score: 7.1
AV:N/AC:M/Au:N/C:N/I:N/A:C
Related Vulnerabilities
- Microsoft Internet Explorer Multiple Memory Corruption Vulnerabilities (2879017)
- Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (961371))
- Microsoft Internet Explorer Data Stream Handling Remote Code Execution Vulnerability (947864)
- Active Directory Could Allow Remote Code Execution Vulnerability (957280)
- Microsoft Bluetooth Stack Remote Code Execution Vulnerability (2566220)