Summary
This host is missing a critical security update according to Microsoft Bulletin MS10-066.
Impact
Successful exploitation could allow attackers to execute arbitrary code and take complete control of an affected system. Failed exploit attempts will likely result in a denial-of-service condition.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/bulletin/ms10-066.mspx
Insight
The flaw is due to the way that the Remote Procedure Call (RPC) client implementation allocates memory when parsing specially crafted RPC responses.
Affected
Microsoft Windows XP Service Pack 3 and prior.
Microsoft Windows 2003 Service Pack 2.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2010-2567 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)
- Microsoft Internet Explorer HTML Rendering Remote Memory Corruption Vulnerability (944533)
- Buffer Overrun In HTML Converter Could Allow Code Execution (823559)
- Microsoft Forefront Protection For Exchange RCE Vulnerability (2927022)
- Internet Explorer Vector Markup Language Remote Code Execution Vulnerability (2544521)