Summary
This host is missing a critical security update according to Microsoft Bulletin MS09-012.
Impact
Successful exploitation could allow attackers to execute arbitrary code by gaining elevated privileges.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/bulletin/ms09-012.mspx
Insight
- Microsoft Distributed Transaction Coordinator (MSDTC) transaction facility allowing the NetworkService token to be obtained and used when making an RPC call.
- Windows Management Instrumentation (WMI) provider improperly isolating processes that run under the NetworkService or LocalService accounts.
- RPCSS service improperly isolating processes that run under the NetworkService or LocalService accounts.
- Windows placing incorrect access control lists (ACLs) on threads in the current ThreadPool.
Affected
Microsoft Windows 2K Service Pack 4 and prior.
Microsoft Windows XP Service Pack 3 and prior.
Microsoft Windows 2003 Service Pack 2 and prior.
Microsoft Windows Vista Service Pack 1 and prior.
Microsoft Windows Server 2008 Service Pack 1 and prior.
References
Severity
Classification
-
CVE CVE-2008-1436, CVE-2009-0078, CVE-2009-0079, CVE-2009-0080 -
CVSS Base Score: 9.0
AV:N/AC:L/Au:S/C:C/I:C/A:C
Related Vulnerabilities
- Buffer Overrun in the ListBox and in the ComboBox (824141)
- Checks for MS HOTFIX for snmp buffer overruns
- Message Queuing Remote Code Execution Vulnerability (951071)
- Microsoft Groove Remote Code Execution Vulnerability (2494047)
- Microsoft DHTML Editing Component ActiveX Remote Code Execution Vulnerability (956844)