Summary
This host is missing a critical security update according to Microsoft Bulletin MS11-012.
Impact
Successful exploitation could allow local attackers to gain elevated privileges.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/bulletin/ms11-012.mspx
Insight
The flaws are caused by input validation errors, improper pointer validation, pointer confusions, and memory corruption errors in the Windows kernel-mode drivers 'win32k.sys' when processing data supplied from user mode to kernel mode, which could allow malicious users to execute arbitrary code with kernel privileges.
Affected
Micorsoft Windows 7
Microsoft Windows XP Service Pack 3 and prior.
Microsoft Windows 2K3 Service Pack 2 and prior.
Microsoft Windows Vista Service Pack 2 and prior.
Microsoft Windows Server 2008 Service Pack 2 and prior.
References
Severity
Classification
-
CVE CVE-2011-0086, CVE-2011-0087, CVE-2011-0088, CVE-2011-0089, CVE-2011-0090 -
CVSS Base Score: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Active Directory LDAP Remote Code Execution Vulnerability (969805)
- Microsoft .NET Framework Authentication Bypass and Spoofing Vulnerabilities (2836440)
- Microsoft .NET Framework Remote Code Execution Vulnerability (3000414)
- Cumulative Security Update for Internet Explorer (931768)
- Cumulative Security Update for Internet Explorer (937143)