Microsoft .NET Framework Privilege Elevation Vulnerability (2769324)

Summary
This host is missing an important security update according to Microsoft Bulletin MS13-004.
Impact
Successful exploitation will allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms13-004
Insight
- An error within the System Drawing namespace of Windows Forms when handling pointers can be exploited to bypass CAS (Code Access Security) restrictions and disclose information. - An error within WinForms when handling certain objects can be exploited to cause a buffer overflow. - A boundary error within the System.DirectoryServices.Protocols namespace when handling objects can be exploited to cause a buffer overflow. - A double construction error within the framework does not validate object permissions and can be exploited via a specially crafted XAML Browser Application (XBAP) or an untrusted .NET application.
Affected
Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0, 3.5, 3.5.1, 4 and 4.5
References