Summary
This host is missing an important security update according to Microsoft Bulletin MS13-077.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code with kernel-mode privileges within the context of the Service Control Manager and or corrupt memory.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, https://technet.microsoft.com/en-us/security/bulletin/ms13-077
Insight
The flaw is due to a double-free error in the Service Control Manager (services.exe) when handling service descriptions from the registry.
Affected
Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
Detection
Get the vulnerable file version and check appropriate patch is applied or not.
References
Severity
Classification
-
CVE CVE-2013-3862 -
CVSS Base Score: 6.9
AV:L/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Windows Local Procedure Call Local Privilege Escalation Vulnerability (2898715)
- Microsoft RDP flaws could allow sniffing and DOS(Q324380)
- Microsoft IIS Malformed File Extension Denial of Service Vulnerability
- Microsoft Office Security Feature Bypass Vulnerability (2961033)
- Microsoft 'ISATAP' Component Spoofing Vulnerability (978338)