Summary
This host is missing a critical security update according to Microsoft Bulletin MS13-053.
Impact
Successful exploitation will allow remote attackers to cause a buffer overflow and execute arbitrary code with kernel privileges.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, https://technet.microsoft.com/en-us/security/bulletin/ms13-053
Insight
Multiple flaws are due to,
- Unspecified errors within the Windows kernel-mode driver (win32k.sys) when processing certain objects and can be exploited to cause a crash or execute arbitrary code with the kernel privilege.
- An error exists within the GDI+ subsystem.
Affected
Microsoft Windows 8
Microsoft Windows Server 2012
Microsoft Windows XP x32 Edition Service Pack 3 and prior Microsoft Windows XP x64 Edition Service Pack 2 and prior Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
References
Severity
Classification
-
CVE CVE-2013-1300, CVE-2013-1340, CVE-2013-1345, CVE-2013-3129, CVE-2013-3167, CVE-2013-3172, CVE-2013-3173, CVE-2013-3660 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Buffer Overrun in the ListBox and in the ComboBox (824141)
- Microsoft .NET Framework and Microsoft Silverlight Remote Code Execution Vulnerabilities (2651026)
- Microsoft Excel Remote Code Execution Vulnerability (956416)
- Microsoft .NET Framework Remote Code Execution Vulnerability (2671605)
- ISA Server 2000 and Proxy Server 2.0 Internet Content Spoofing (888258)