Summary
This host is missing an important security update according to Microsoft Bulletin MS12-041.
Impact
Successful exploitation could allow remote attackers to execute arbitrary code with kernel-mode privileges
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms12-041
Insight
Multiple flaws are due to,
- An error in win32k.sys within the string atom class name and lipboard format atom name handling and can be exploited to execute arbitrary code.
- An integer overflow error when handling the reference counter for font resources when loading TrueType fonts.
- A race condition error in win32k.sys when handling particular thread creation attempts and can be exploited to execute arbitrary code.
Affected
Microsoft Windows XP x32 Edition Service Pack 3 and prior Microsoft Windows XP x64 Edition Service Pack 2 and prior Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
References
Severity
Classification
-
CVE CVE-2012-1864, CVE-2012-1865, CVE-2012-1866, CVE-2012-1867, CVE-2012-1868 -
CVSS Base Score: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Flaw in Microsoft VM Could Allow Code Execution (810030)
- Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2265906)
- Cumulative Security Update for Internet Explorer (931768)
- Microsoft .NET Framework Remote Code Execution Vulnerability (2706726)
- Microsoft IIS Security Bypass Vulnerability (970483)