Executive Summary

Summary
TitleVulnerabilities in Windows Kernel
Informations
NameMS12-008First vendor Publication2012-02-14
VendorMicrosoftLast vendor Modification2012-02-14
Severity (Vendor) CriticalRevision1.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score9.3Attack RangeNetwork
Cvss Impact Score10Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Revision Note: V1.0 (February 14, 2012): Bulletin published.

Summary: This security update resolves a privately reported vulnerability and a publicly disclosed vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a website containing specially crafted content or if a specially crafted application is run locally. An attacker would have no way to force users to visit a malicious website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website.

Original Source

Url : http://technet.microsoft.com/en-us/security/bulletin/ms12-008

CWE : Common Weakness Enumeration

idName
CWE-20Improper Input Validation
CWE-399Resource Management Errors

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:14603
 
Oval ID: oval:org.mitre.oval:def:14603
Title: GDI Access Violation Vulnerability
Description: The Graphics Device Interface (GDI) in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate user-mode input, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted data, as demonstrated by a large height attribute of an IFRAME element rendered by Safari, aka "GDI Access Violation Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2011-5046
Version: 7
Platform(s): Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15476
 
Oval ID: oval:org.mitre.oval:def:15476
Title: UAG Blind HTTP Redirect Vulnerability
Description: Open redirect vulnerability in Microsoft Forefront Unified Access Gateway (UAG) 2010 SP1 and SP1 Update 1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a crafted URL, aka "UAG Blind HTTP Redirect Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2012-0146
Version: 3
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Product(s): Forefront Unified Access Gateway 2010
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:14928
 
Oval ID: oval:org.mitre.oval:def:14928
Title: Keyboard Layout Use After Free Vulnerability
Description: Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers keyboard layout errors, aka "Keyboard Layout Use After Free Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2012-0154
Version: 5
Platform(s): Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application2
Os4
Os3
Os10
Os2
Os3

OpenVAS Exploits

DateDescription
2012-04-12Name : MS Forefront Unified Access Gateway Information Disclosure Vulnerability (266...
File : nvt/secpod_ms12-026.nasl
2012-02-15Name : Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2660465)
File : nvt/secpod_ms12-008.nasl
0000-00-00Name : Microsoft Windows Kernel 'win32k.sys' Memory Corruption Vulnerability
File : nvt/gb_ms_win_kernel_win32k_sys_mem_corruption_vuln.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
77908Microsoft Windows win32k.sys Safari IFRAME Height Attribute Handling Remote M...

Information Assurance Vulnerability Management (IAVM)

DateDescription
2012-04-12IAVM : 2012-B-0042 - Multiple Vulnerabilities in Microsoft Forefront Unified Access Gateway (UAG)
Severity : Category II - VMSKEY : V0031985

Snort® IPS/IDS

DateDescription
2014-01-10Microsoft Windows 7 x64 Apple Safari abnormally long iframe exploit attempt
RuleID : 20999 - Revision : 9 - Type : BROWSER-WEBKIT

Nessus® Vulnerability Scanner

DateDescription
2012-04-11Name : A web application on the remote Windows host has multiple vulnerabilities.
File : smb_nt_ms12-026.nasl - Type : ACT_GATHER_INFO
2012-02-14Name : The remote Windows kernel is affected by multiple remote code execution vulne...
File : smb_nt_ms12-008.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
DateInformations
2014-03-20 21:21:09
  • Multiple Updates
2014-02-17 11:47:14
  • Multiple Updates
2014-01-19 21:30:47
  • Multiple Updates