Summary
This host is missing a critical security update according to Microsoft Bulletin MS08-062.
Impact
Successful exploitation result in execution of arbitrary code by tricking Web Server into visiting to a malicious IPP server via a specially crafted HTTP POST request.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/bulletin/ms08-062.mspx
Insight
The flaw is due to an integer overflow error within the IPP (Internet Printing Protocol) ISAPI extension for IIS when processing specially crafted IPP responses.
Affected
Microsoft Windows 2K Service Pack 4 and prior
Microsoft Windows XP Service Pack 3 and prior
Microsoft Windows 2003 Service Pack 2 and prior
Microsoft Windows Vista Service Pack 1 and prior
Microsoft Windows 2008 Server Service Pack 1 and prior
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2008-1446 -
CVSS Base Score: 9.0
AV:N/AC:L/Au:S/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (961371))
- Cumulative Security Update for Internet Explorer (972260)
- Host Integration Server RPC Service Remote Code Execution Vulnerability (956695)
- Internet Information Services (IIS) FTP Service Remote Code Execution Vulnerability (2489256)
- Microsoft .NET Framework Remote Code Execution Vulnerability (2706726)