Microsoft System Center Operations Manager vulnerabilities could allow privilege escalation
Report ID: MS201301003
Date Published: 10 January 2013
Compromise Type: cross-site-scripting privilege-escalation
Compromise From: remote
Microsoft System Center Operations Manager 2007
Microsoft System Center Operations Manager 2007 R2
Two vulnerabilities in Microsoft System Center Operations Manager could allow script code to run under the guise of the server, providing the attacker an opportunity to issue commands to the server in the context of a logged-on user.
Microsoft has released a security update for the System Center Operations Manager to address two reported vulnerabilities. They were caused by improper validation of input, and can be exploited into allowing an attacker to issue commands to the System Center Operations Manager server and take actions on behalf of the user.
These issues have been resolved through the latest security update, which introduces modifications in in the way of accepting input. Users are recommended to install the update as a protection measure against potential exploit attempts.
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-003)
F-Secure Health Check
F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.