Summary
This host is missing an important security update according to Microsoft Bulletin MS13-076.
Impact
Successful exploitation will allow remote attackers to gain escalated privileges, read arbitrary kernel memory and cause a DoS (Denial of Service).
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, https://technet.microsoft.com/en-us/security/bulletin/ms13-076
Insight
Multiple flaws are due to error related to multiple fetch within the kernel-mode driver (win32k.sys).
Affected
Microsoft Windows 8
Microsoft Windows Server 2012
Microsoft Windows XP x32 Edition Service Pack 3 and prior Microsoft Windows XP x64 Edition Service Pack 2 and prior Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Detection
Get the vulnerable file version and check appropriate patch is applied or not.
References
Severity
Classification
-
CVE CVE-2013-1341, CVE-2013-1342, CVE-2013-1343, CVE-2013-1344, CVE-2013-3864, CVE-2013-3865, CVE-2013-3866 -
CVSS Base Score: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Blended Threat Vulnerability in SearchPath Could Allow Elevation of Privilege (959426)
- Internet Information Services (IIS) FTP Service Remote Code Execution Vulnerability (2489256)
- Microsoft IIS FTP Server 'Malformed FTP List Request' DOS Vulnerability
- Flaw in Microsoft VM Could Allow Code Execution (810030)
- Microsoft Internet Explorer Multiple Memory Corruption Vulnerabilities (2879017)