Summary
This host is installed with Microsoft Windows operating system and is prone to Spoofing vulnerability.
Impact
Successful exploitation could allow remote attackers to use the certificates to spoof content, perform phishing attacks, or perform man-in-the-middle attacks.
Impact Level: System
Solution
Apply the Patch from below link,
http://support.microsoft.com/kb/2728973
Insight
Microsoft certificate authorities, which are stored outside the recommended secure storage practices can be misused. An attacker could use these certificates to spoof content, perform phishing attacks, or perform man-in-the-middle attacks.
Affected
Microsoft Windows XP x32 Edition Service Pack 3 and prior Microsoft Windows XP x64 Edition Service Pack 2 and prior Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
References
Severity
Classification
-
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Windows SMB2 '_Smb2ValidateProviderCallback()' Remote Code Execution Vulnerability
- Opera skin zip file buffer overflow vulnerability
- Adobe Acrobat 9 PDF Document Encryption Weakness Vulnerability (Win)
- Microsoft ASP.NET Insecure Site Configuration Vulnerability (2905247)
- The remote host is infected by a virus