Executive Summary

Summary
Title Vulnerability in Windows Could Allow Remote Code Execution (2653956)
Informations
Name MS12-024 First vendor Publication 2012-04-10
Vendor Microsoft Last vendor Modification 2012-07-31
Severity (Vendor) Critical Revision 1.1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Revision Note: V1.1 (July 31, 2012): Bulletin revised to announce a detection change in the Windows Vista packages for KB2653956 to correct a Windows Update reoffering issue. This is a detection change only. Customers who have already successfully updated their systems do not need to take any action.

Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user or application runs or installs a specially crafted, signed portable executable (PE) file on an affected system.

Original Source

Url : http://technet.microsoft.com/en-us/security/bulletin/ms12-024

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:15594
 
Oval ID: oval:org.mitre.oval:def:15594
Title: WinVerifyTrust Signature Validation Vulnerability
Description: The Authenticode Signature Verification function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute arbitrary code via a modified file with additional content, aka "WinVerifyTrust Signature Validation Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2012-0151
Version: 3
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 2
Os 1
Os 5
Os 1
Os 2

OpenVAS Exploits

Date Description
2012-04-11 Name : Windows Authenticode Signature Remote Code Execution Vulnerability (2653956)
File : nvt/secpod_ms12-024.nasl

Information Assurance Vulnerability Management (IAVM)

Date Description
2012-04-12 IAVM : 2012-A-0060 - Microsoft Windows Remote Code Execution Vulnerability
Severity : Category II - VMSKEY : V0031983

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Windows Authenticode signature verification bypass attempt
RuleID : 26601 - Revision : 4 - Type : FILE-EXECUTABLE
2014-01-10 Microsoft Windows Authenticode signature verification bypass attempt
RuleID : 26590 - Revision : 5 - Type : FILE-EXECUTABLE
2014-01-10 Microsoft Windows Authenticode signature verification bypass attempt
RuleID : 25779 - Revision : 3 - Type : FILE-EXECUTABLE
2014-01-10 Microsoft Windows Authenticode signature verification bypass attempt
RuleID : 25357 - Revision : 8 - Type : FILE-EXECUTABLE
2014-01-10 Microsoft Windows Authenticode signature verification bypass attempt
RuleID : 22942 - Revision : 9 - Type : FILE-EXECUTABLE
2014-01-10 Microsoft Windows Authenticode signature verification bypass attempt
RuleID : 21795 - Revision : 10 - Type : FILE-EXECUTABLE

Nessus® Vulnerability Scanner

Date Description
2012-04-11 Name : The remote Windows host has a code execution vulnerability.
File : smb_nt_ms12-024.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2014-02-17 11:47:17
  • Multiple Updates
2014-01-19 21:30:48
  • Multiple Updates
2013-11-11 12:41:28
  • Multiple Updates