Korean
<< Back
VID 26630
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The hotfix (MS12-075, 2761226) for 'Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution' has not been applied.
This security update resolves three privately reported vulnerabilities in Microsoft Windows.

- Win32k Use After Free Vulnerability (CVE-2012-2530, CVE-2012-2553)
An elevation of privilege vulnerability exists when the Windows kernel-mode driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

- TrueType Font Parsing Vulnerability (CVE-2012-2897)
A remote code execution vulnerability exists in the way that affected components handle a specially crafted TrueType font file. The vulnerability could allow remote code execution if a user opens a specially crafted TrueType font file. An attacker who successfully exploited this vulnerability could take complete control of an affected system.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://technet.microsoft.com/en-us/security/Bulletin/MS12-075

* Platforms Affected:
Windows XP Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems and Service Pack 1
Windows 7 for x64-based Systems and Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Windows 8 for 32-bit Systems
Windows 8 for x64-based Systems
Windows Server 2012
Recommendation Apply the appropriate patch (2761226) for your system, as listed in Microsoft Security Bulletin MS12-075 at http://technet.microsoft.com/en-us/security/bulletin/ms12-075
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2012-2530,CVE-2012-2553,CVE-2012-2897 (CVE)
Related URL 56447,56448,56457 (SecurityFocus)
Related URL (ISS)