Executive Summary

Informations
Name CVE-2012-1866 First vendor Publication 2012-06-12
Vendor Cve Last vendor Modification 2013-03-06

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle user-mode input passed to kernel mode for driver objects, which allows local users to gain privileges via a crafted application, aka "Clipboard Format Atom Name Handling Vulnerability."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1866

CWE : Common Weakness Enumeration

idName
CWE-20Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:15096
 
Oval ID: oval:org.mitre.oval:def:15096
Title: Clipboard Format Atom Name Handling Vulnerability (CVE-2012-1866)
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle user-mode input passed to kernel mode for driver objects, which allows local users to gain privileges via a crafted application, aka "Clipboard Format Atom Name Handling Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2012-1866
Version: 5
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os2
Os5
Os2
Os6
Os2
Os2

OpenVAS Exploits

DateDescription
2012-06-13Name : Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2709162)
File : nvt/secpod_ms12-041.nasl

Nessus® Vulnerability Scanner

DateDescription
2012-06-13Name : The remote Windows host is affected by multiple privilege escalation vulnerab...
File : smb_nt_ms12-041.nasl - Type : ACT_GATHER_INFO

Internal Sources (Detail)

SourceUrl
CERT http://www.us-cert.gov/cas/techalerts/TA12-164A.html
MS http://technet.microsoft.com/security/bulletin/MS12-041

Alert History

If you want to see full details history, please login or register.
0
1
2
DateInformations
2014-02-17 11:09:24
  • Multiple Updates
2013-05-10 22:37:17
  • Multiple Updates
2013-03-07 13:19:45
  • Multiple Updates