Microsoft Windows Local Procedure Call Local Privilege Escalation Vulnerability (2898715)

This host is missing an important security update according to Microsoft Bulletin MS13-102.
Successful exploitation will allow attackers to execute arbitrary code and take complete control of an affected system. Impact Level: System
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link,
The flaw is due to an unspecified error within the LRPC client and can be exploited to cause a stack-based buffer overflow by sending a specially crafted LPC (Local Procedure Call) port message via a customised LRPC server.
Microsoft Windows XP Service Pack 3 and prior Microsoft Windows XP x64 Edition Service Pack 2 and prior Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
Get the vulnerable file version and check appropriate patch is applied or not.