Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2012-04-10 |
Product | Commerce Server | Last view | 2012-08-14 |
Version | 2002 | Type | Application |
Update | sp4 | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:microsoft:commerce_server |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8.8 | 2012-08-14 | CVE-2012-1856 | The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL Server 2008 SP2, SP3, R2, R2 SP1, and R2 SP2, Commerce Server 2002 SP4, Commerce Server 2007 SP2, Commerce Server 2009 Gold and R2, Host Integration Server 2004 SP1, Visual FoxPro 8.0 SP1, Visual FoxPro 9.0 SP2, and Visual Basic 6.0 Runtime allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption, aka "MSCOMCTL.OCX RCE Vulnerability." |
8.8 | 2012-04-10 | CVE-2012-0158 | The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2; BizTalk Server 2002 SP1; Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and R2; Visual FoxPro 8.0 SP1 and 9.0 SP2; and Visual Basic 6.0 Runtime allow remote attackers to execute arbitrary code via a crafted (a) web site, (b) Office document, or (c) .rtf file that triggers "system state" corruption, as exploited in the wild in April 2012, aka "MSCOMCTL.OCX RCE Vulnerability." |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
SAINT Exploits
Description | Link |
---|---|
Microsoft Windows Common Controls MSCOMCTL.OCX Vulnerability | More info here |
OpenVAS Exploits
id | Description |
---|---|
2012-08-15 | Name : Microsoft Windows Common Controls Remote Code Execution Vulnerability (2720573) File : nvt/secpod_ms12-060.nasl |
2012-04-11 | Name : Microsoft Windows Common Controls Remote Code Execution Vulnerability (2664258) File : nvt/secpod_ms12-027.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2012-A-0132 | Microsoft Windows Common Controls Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0033659 |
2012-A-0059 | Microsoft Windows Common Controls Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0031982 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-04-18 | Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt RuleID : 49496 - Type : FILE-OFFICE - Revision : 1 |
2019-04-18 | Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt RuleID : 49494 - Type : FILE-OFFICE - Revision : 1 |
2017-09-19 | RTF obfuscation string RuleID : 43990 - Type : INDICATOR-OBFUSCATION - Revision : 3 |
2017-09-19 | newlines embedded in rtf header RuleID : 43989 - Type : INDICATOR-OBFUSCATION - Revision : 3 |
2015-01-20 | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt RuleID : 32863 - Type : FILE-OFFICE - Revision : 4 |
2015-01-20 | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt RuleID : 32862 - Type : FILE-OFFICE - Revision : 3 |
2015-01-20 | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt RuleID : 32861 - Type : FILE-OFFICE - Revision : 2 |
2015-01-20 | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt RuleID : 32860 - Type : FILE-OFFICE - Revision : 2 |
2015-01-20 | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt RuleID : 32859 - Type : FILE-OFFICE - Revision : 2 |
2015-01-20 | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt RuleID : 32858 - Type : FILE-OFFICE - Revision : 2 |
2015-01-20 | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt RuleID : 32857 - Type : FILE-OFFICE - Revision : 2 |
2014-11-16 | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt RuleID : 31927 - Type : FILE-OFFICE - Revision : 2 |
2014-11-16 | Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt RuleID : 31926 - Type : FILE-OFFICE - Revision : 2 |
2014-11-16 | Win.Trojan.Otupsys variant outbound connection RuleID : 31716 - Type : MALWARE-CNC - Revision : 2 |
2014-06-14 | Shiqiang Gang malicious XLS targeted attack detection RuleID : 30991 - Type : MALWARE-CNC - Revision : 6 |
2014-06-14 | Shiqiang Gang malicious XLS targeted attack detection RuleID : 30990 - Type : MALWARE-CNC - Revision : 5 |
2014-06-14 | DNS request for known malware domain help.2012hi.hk RuleID : 30989 - Type : BLACKLIST - Revision : 3 |
2014-05-01 | multiple binary tags in close proximity - potentially malicious RuleID : 30328 - Type : INDICATOR-OBFUSCATION - Revision : 3 |
2014-05-01 | multiple binary tags in close proximity - potentially malicious RuleID : 30327 - Type : INDICATOR-OBFUSCATION - Revision : 3 |
2014-04-12 | Microsoft Windows common controls stack buffer overflow via malicious toolbar... RuleID : 30166 - Type : FILE-OFFICE - Revision : 2 |
2014-04-12 | Microsoft Windows common controls stack buffer overflow via malicious toolbar... RuleID : 30165 - Type : FILE-OFFICE - Revision : 2 |
2014-04-12 | Microsoft Windows common controls stack buffer overflow via malicious MSComct... RuleID : 30164 - Type : FILE-OFFICE - Revision : 2 |
2014-04-12 | Microsoft Windows common controls stack buffer overflow via malicious MSComct... RuleID : 30163 - Type : FILE-OFFICE - Revision : 2 |
2014-04-12 | Microsoft Windows common controls stack buffer overflow via malicious MSComct... RuleID : 30162 - Type : FILE-OFFICE - Revision : 2 |
2014-04-12 | Microsoft Windows common controls stack buffer overflow via malicious MSComct... RuleID : 30161 - Type : FILE-OFFICE - Revision : 2 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2012-08-15 | Name: The remote Windows host has a code execution vulnerability. File: smb_nt_ms12-060.nasl - Type: ACT_GATHER_INFO |
2012-04-11 | Name: The remote Windows host is affected by a remote code execution vulnerability. File: smb_nt_ms12-027.nasl - Type: ACT_GATHER_INFO |