Executive Summary

Informations
Name CVE-2012-0157 First vendor Publication 2012-03-13
Vendor Cve Last vendor Modification 2013-03-06

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle window messaging, which allows local users to gain privileges via a crafted application that calls the PostMessage function, aka "PostMessage Function Vulnerability."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0157

CWE : Common Weakness Enumeration

idName
CWE-20Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:14217
 
Oval ID: oval:org.mitre.oval:def:14217
Title: PostMessage Function Vulnerability
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle window messaging, which allows local users to gain privileges via a crafted application that calls the PostMessage function, aka "PostMessage Function Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2012-0157
Version: 5
Platform(s): Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os4
Os3
Os7
Os2
Os2

OpenVAS Exploits

DateDescription
2012-03-14Name : Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2641653)
File : nvt/secpod_ms12-018.nasl

Nessus® Vulnerability Scanner

DateDescription
2012-03-13Name : The remote Windows kernel is affected by a privilege escalation vulnerability.
File : smb_nt_ms12-018.nasl - Type : ACT_GATHER_INFO

Internal Sources (Detail)

SourceUrl
CERT http://www.us-cert.gov/cas/techalerts/TA12-073A.html
MS http://technet.microsoft.com/security/bulletin/MS12-018

Alert History

If you want to see full details history, please login or register.
0
1
2
DateInformations
2014-02-17 11:07:04
  • Multiple Updates
2013-05-10 22:31:31
  • Multiple Updates
2013-03-07 13:19:41
  • Multiple Updates