This host has Microsoft Internet Explorer installed, which is prone to HTTP request splitting/smuggling and HTML Objects Memory Corruption Vulnerabilities.
Successful exploitation allow remote attackers to execute arbitrary code by tricking user into visiting a specially crafted web page and to read data from a Web page in another domain in Internet Explorer. Attackers can use above issues to poison web caches, steal credentials, launch cross-site scripting, HTML-injection, and session-hijacking attacks. Impact Level: Application
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link. http://www.microsoft.com/technet/security/bulletin/ms08-031.mspx
The flaws are due to - a memory corruption error while processing a Web page that contains certain unexpected method calls to HTML objects. - failure of setRequestHeader method of the XMLHttpRequest object to block dangerous HTTP request headers when certain 8-bit character sequences are appended to a header name.
Microsoft Internet Explorer 5.01 & 6 SP1 for Microsoft Windows 2000 Microsoft Internet Explorer 6 for Microsoft Windows 2003 and XP Microsoft Internet Explorer 7 for Microsoft Windows 2003 and XP Microsoft Internet Explorer 7 on MS Windows 2008 and Vista
- Microsoft Internet Explorer Multiple Code Execution Vulnerabilities (974455)
- Microsoft .NET Framework Privilege Elevation Vulnerability (2958732)
- Microsoft Active Accessibility Remote Code Execution Vulnerability (2623699)
- Microsoft Ancillary Function Driver Elevation of Privilege Vulnerability (956803)
- Microsoft DirectShow Remote Code Execution Vulnerability (961373)