Summary
This host is missing a critical security update according to Microsoft Bulletin MS12-008.
Impact
Successful exploitation could allow remote attackers to cause a denial of service and possibly execute arbitrary code with kernel-level privileges.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms12-008
Insight
Multiple flaws are due to
- An error in win32k.sys when validating input passed from user mode through the kernel component of GDI can be exploited to corrupt memory via a specially crafted web page containing an IFRAME with an overly large 'height' attribute viewed using the Apple Safari browser.
- A use-after-free error in win32k.sys when handling certain keyboard layouts can be exploited to dereference already freed memory and gain escalated privileges.
Affected
Micorsoft Windows 7 Service Pack 1 and prior.
Microsoft Windows XP Service Pack 3 and prior.
Microsoft Windows 2003 Service Pack 2 and prior.
Microsoft Windows Vista Service Pack 2 and prior.
Microsoft Windows Server 2008 Service Pack 2 and prior.
References
Severity
Classification
-
CVE CVE-2011-5046, CVE-2012-0154 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Distributed File System Remote Code Execution Vulnerabilities (2535512)
- Consent User Interface Privilege Escalation Vulnerability (2442962)
- Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (972270)
- Internet Explorer Vector Markup Language Remote Code Execution Vulnerability (2544521)
- Microsoft .NET Framework Privilege Elevation Vulnerability (2800277)