Microsoft Lync Remote Code Execution Vulnerabilities (2707956)

Summary
This host is missing a critical security update according to Microsoft Bulletin MS12-039.
Impact
Successful exploitation could allow an attacker to execute arbitrary code with kernel-level privileges. Failed exploit attempts may result in a denial of service condition. Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms12-039
Insight
- An error within the Win32k kernel-mode driver (win32k.sys) when parsing TrueType fonts. - An error in the t2embed.dll module when parsing TrueType fonts. - The client loads libraries in an insecure manner, which can be exploited to load arbitrary libraries by tricking a user into opening a '.ocsmeet' file located on a remote WebDAV or SMB share. - An unspecified error in the 'SafeHTML' API when sanitising HTML code can be exploited to execute arbitrary HTML and script code in the user's chat session.
Affected
Microsoft Lync 2010 Microsoft Lync 2010 Attendee Microsoft Lync 2010 Attendant Microsoft Communicator 2007 R2
References