Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Vulnerability protection

Remote procedure call vulnerability could allow escalation of privilege


Report ID: MS201308004
Date Published: 14 August 2013

Criticality: Important
Compromise Type: privilege-escalation
Compromise From: remote


Affected Product/Component:

Windows XP
Windows Server 2003
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8
Windows Server 2012
Windows RT




Summary

A vulnerability that exists when Windows handles asynchronous Remote Procedure Call (RPC) request could be exploited into allowing an attacker to execute code on an affected system.



Detailed Description

Microsoft has issued a security update to address a vulnerability that exists when Windows handles asynchronous Remote Procedure Call (RPC) requests. An attacker who successfully exploited this vulnerability could be able to execute arbitrary code on an affected system within the context of another user.

The vulnerability has been patched through the latest update which introduces a modification in the way of handling RPC messages. Users are recommended to install the latest update onto their system as a protection measure against potential exploit attempts.



CVE Reference

CVE-2013-3175



Solution

Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-062)




Security Advisories

For a list of known vulnerabilities affecting F-Secure products and the released fixes, please refer to the Security Advisories page.