Summary
This host is missing an critical security update according to Microsoft Bulletin MS13-099.
Impact
Successful exploitation will allow attackers to execute arbitrary code, cause a DoS (Denial of Service), and compromise the vulnerable system.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, https://technet.microsoft.com/en-us/security/bulletin/ms13-099
Insight
The flaw is due to memory corruption resulting from improperly handling of an object in memory by Scripting Runtime Object Library.
Affected
Microsoft Windows XP Service Pack 3 and prior
Microsoft Windows XP x64 Edition Service Pack 2 and prior Microsoft Windows 2003 x32/x64 Service Pack 2 and prior Microsoft Windows Vista x32/x64 Service Pack 2 and prior Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior Microsoft Windows 7 x32/x64 Service Pack 1 and prior Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior Microsoft Windows 8 x32/x64
Microsoft Windows 8.1 x32/x64
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Detection
Get the vulnerable file version and check appropriate patch is applied or not.
References
Severity
Classification
-
CVE CVE-2013-5056 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Help and Support Center Remote Code Execution Vulnerability (2229593)
- ISA Server 2000 and Proxy Server 2.0 Internet Content Spoofing (888258)
- Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability (2387149)
- Microsoft .NET Framework Remote Code Execution Vulnerability (2745030)
- Cumulative Security Update for Internet Explorer (950759)