Summary
This host is missing a critical security update according to Microsoft Bulletin MS12-024.
Impact
Successful exploitation could allow remote attackers to execute arbitrary code as the logged-on user.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms12-024
Insight
The flaw is due to the way Windows Authenticode Signature Verification function verifies portable executable (PE) files, which can be exploited to add malicious code to the file without invalidating the signature.
Affected
Microsoft Windows 7 Service Pack 1 and prior
Microsoft Windows XP Service Pack 3 and prior
Microsoft Windows 2003 Service Pack 2 and prior
Microsoft Windows Vista Service Pack 2 and prior
Microsoft Windows Server 2008 Service Pack 2 and prior
References
Severity
Classification
-
CVE CVE-2012-0151 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft IIS FTP Server 'Malformed FTP List Request' DOS Vulnerability
- Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2265906)
- Microsoft .NET Framework Multiple Vulnerabilities (2861561)
- Embedded OpenType Font Engine Remote Code Execution Vulnerability (982132)
- Microsoft IIS Authentication Remote Code Execution Vulnerability (982666)