This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2013-12-10
Product Windows Server 2012 Last view 2016-06-15
Version r2 Type Os
Update *  
Edition *  
Language *  
Sofware Edition essentials  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:microsoft:windows_server_2012

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
5 2016-06-15 CVE-2016-3232

The Virtual PCI (VPCI) virtual service provider in Microsoft Windows Server 2012 Gold and R2 allows local users to obtain sensitive information from uninitialized memory locations via a crafted application, aka "Windows Virtual PCI Information Disclosure Vulnerability."

8.8 2016-06-15 CVE-2016-3228

Microsoft Windows Server 2008 SP2 and R2 SP1 and Windows Server 2012 Gold and R2 allow remote authenticated users to execute arbitrary code via a crafted NetLogon request, aka "Windows Netlogon Memory Corruption Remote Code Execution Vulnerability."

9.8 2016-06-15 CVE-2016-3227

Use-after-free vulnerability in the DNS Server component in Microsoft Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted requests, aka "Windows DNS Server Use After Free Vulnerability."

6.5 2016-06-15 CVE-2016-3226

Active Directory in Microsoft Windows Server 2008 R2 SP1 and Server 2012 Gold and R2 allows remote authenticated users to cause a denial of service (service hang) by creating many machine accounts, aka "Active Directory Denial of Service Vulnerability."

5.3 2016-02-10 CVE-2016-0050

Network Policy Server (NPS) in Microsoft Windows Server 2008 SP2 and R2 SP1 and Server 2012 Gold and R2 misparses username queries, which allows remote attackers to cause a denial of service (RADIUS authentication outage) via crafted requests, aka "Network Policy Server RADIUS Implementation Denial of Service Vulnerability."

7.5 2016-02-10 CVE-2016-0037

The forms-based authentication implementation in Active Directory Federation Services (ADFS) 3.0 in Microsoft Windows Server 2012 R2 allows remote attackers to cause a denial of service (daemon outage) via crafted data, aka "Microsoft Active Directory Federation Services Denial of Service Vulnerability."

9.3 2015-12-09 CVE-2015-6125

Use-after-free vulnerability in the DNS server in Microsoft Windows Server 2008 SP2 and R2 SP1 and Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted requests, aka "Windows DNS Use After Free Vulnerability."

4 2015-09-08 CVE-2015-2535

Active Directory in Microsoft Windows Server 2008 SP2 and R2 SP1 and Server 2012 Gold and R2 allows remote authenticated users to cause a denial of service (service outage) by creating multiple machine accounts, aka "Active Directory Denial of Service Vulnerability."

5 2015-07-14 CVE-2015-2417

OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via crafted input, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "OLE Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2416.

5 2015-07-14 CVE-2015-2416

OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via crafted input, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "OLE Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2417.

7.2 2015-07-14 CVE-2015-2387

ATMFD.DLL in the Adobe Type Manager Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "ATMFD.DLL Memory Corruption Vulnerability."

2.1 2015-07-14 CVE-2015-2382

win32k.sys in the kernel-mode drivers in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to obtain sensitive information from kernel memory via a crafted application, aka "Win32k Information Disclosure Vulnerability," a different vulnerability than CVE-2015-2381.

2.1 2015-07-14 CVE-2015-2381

win32k.sys in the kernel-mode drivers in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to obtain sensitive information from kernel memory via a crafted application, aka "Win32k Information Disclosure Vulnerability," a different vulnerability than CVE-2015-2382.

3.3 2015-07-14 CVE-2015-2374

The Netlogon service in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 Gold and R2 does not properly implement domain-controller communication, which allows remote attackers to discover credentials by leveraging certain PDC access and spoofing the BDC role in a PDC communication channel, aka "Elevation of Privilege Vulnerability in Netlogon."

6.9 2015-07-14 CVE-2015-2371

The Windows Installer service in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a custom action script associated with a .msi package, aka "Windows Installer EoP Vulnerability."

7.2 2015-07-14 CVE-2015-2370

The authentication implementation in the RPC subsystem in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not prevent DCE/RPC connection reflection, which allows local users to gain privileges via a crafted application, aka "Windows RPC Elevation of Privilege Vulnerability."

6.9 2015-07-14 CVE-2015-2368

Untrusted search path vulnerability in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka "Windows DLL Remote Code Execution Vulnerability."

2.1 2015-07-14 CVE-2015-2367

win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to obtain sensitive information from uninitialized kernel memory via a crafted application, aka "Win32k Information Disclosure Vulnerability."

7.2 2015-07-14 CVE-2015-2366

win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."

7.2 2015-07-14 CVE-2015-2365

win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."

7.2 2015-07-14 CVE-2015-2364

The graphics component in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application that leverages an incorrect bitmap conversion, aka "Graphics Component EOP Vulnerability."

7.2 2015-07-14 CVE-2015-2362

Hyper-V in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly initialize guest OS system data structures, which allows guest OS users to execute arbitrary code on the host OS by leveraging guest OS privileges, aka "Hyper-V System Data Structure Vulnerability."

7.2 2015-07-14 CVE-2015-2361

Hyper-V in Microsoft Windows 8.1 and Windows Server 2012 R2 does not properly initialize guest OS system data structures, which allows guest OS users to execute arbitrary code on the host OS or cause a denial of service (buffer overflow) by leveraging guest OS privileges, aka "Hyper-V Buffer Overflow Vulnerability."

5.8 2015-04-14 CVE-2015-1638

Microsoft Active Directory Federation Services (AD FS) 3.0 on Windows Server 2012 R2 does not properly handle logoff actions, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation, aka "Active Directory Federation Services Information Disclosure Vulnerability."

4.3 2015-03-11 CVE-2015-0005

The NETLOGON service in Microsoft Windows Server 2003 SP2, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 Gold and R2, when a Domain Controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, aka "NETLOGON Spoofing Vulnerability."

CWE : Common Weakness Enumeration

%idName
30% (8) CWE-264 Permissions, Privileges, and Access Controls
30% (8) CWE-20 Improper Input Validation
19% (5) CWE-200 Information Exposure
7% (2) CWE-254 Security Features
3% (1) CWE-284 Access Control (Authorization) Issues
3% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
3% (1) CWE-17 Code

Information Assurance Vulnerability Management (IAVM)

id Description
2015-B-0110 Microsoft Active Directory Service Denial of Service Vulnerability (MS15-096)
Severity: Category II - VMSKEY: V0061369
2015-A-0165 Microsoft Remote Procedure Call (RPC) Privilege Escalation Vulnerability (MS1...
Severity: Category II - VMSKEY: V0061093
2015-A-0164 Microsoft Windows Installer Privilege Escalation Vulnerability (MS15-074)
Severity: Category II - VMSKEY: V0061095
2015-A-0162 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-073)
Severity: Category II - VMSKEY: V0061097
2015-A-0169 Multiple Vulnerabilities in Microsoft OLE (MS15-075)
Severity: Category II - VMSKEY: V0061103
2015-A-0168 Microsoft Graphics Component Privilege Escalation Vulnerability (MS15-072)
Severity: Category II - VMSKEY: V0061105
2015-A-0173 Microsoft Windows Netlogon Privilege Escalation Vulnerability (MS15-071)
Severity: Category II - VMSKEY: V0061111
2015-B-0091 Multiple Vulnerabilities in Microsoft Hyper-V (MS15-068)
Severity: Category II - VMSKEY: V0061119
2015-A-0167 Multiple Vulnerabilities in Microsoft Windows (MS15-069)
Severity: Category II - VMSKEY: V0061129
2015-B-0051 Microsoft Active Directory Federation Services Information Disclosure Vulnera...
Severity: Category II - VMSKEY: V0059913
2014-B-0059 Multiple Vulnerabilities in Microsoft Windows
Severity: Category I - VMSKEY: V0050447
2014-B-0028 Microsoft Security Account Manager Remote (SAMR) Security Bypass Vulnerability
Severity: Category II - VMSKEY: V0046171
2013-A-0232 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers
Severity: Category I - VMSKEY: V0042582

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2016-03-14 DNS DNAME query detected - possible attack attempt
RuleID : 37015 - Type : PROTOCOL-DNS - Revision : 2
2015-08-14 Microsoft Internet Explorer protected mode request for atlthunk.dll over SMB ...
RuleID : 35216 - Type : BROWSER-IE - Revision : 3
2015-08-14 Microsoft Internet Explorer protected mode atlthunk.dll dll-load exploit attempt
RuleID : 35215 - Type : BROWSER-IE - Revision : 3
2015-08-14 Adobe Flash Player Microsoft Internet Explorer sandbox escape attempt
RuleID : 35189 - Type : FILE-FLASH - Revision : 3
2015-08-14 Adobe Flash Player Microsoft Internet Explorer sandbox escape attempt
RuleID : 35188 - Type : FILE-FLASH - Revision : 3
2015-08-14 Adobe Flash Player Microsoft Internet Explorer sandbox escape attempt
RuleID : 35187 - Type : FILE-FLASH - Revision : 3
2015-08-14 Adobe Flash Player Microsoft Internet Explorer sandbox escape attempt
RuleID : 35186 - Type : FILE-FLASH - Revision : 3
2015-08-14 DCOM DCE/RPC NTLM reflection elevation of privilege attempt
RuleID : 35175 - Type : OS-WINDOWS - Revision : 3
2015-08-14 DCOM DCE/RPC NTLM reflection elevation of privilege attempt
RuleID : 35174 - Type : OS-WINDOWS - Revision : 3
2015-08-14 Microsoft Internet Explorer IDataObject bitmap data conversion integer overfl...
RuleID : 35163 - Type : FILE-FLASH - Revision : 3
2015-08-14 Microsoft Internet Explorer IDataObject bitmap data conversion integer overfl...
RuleID : 35162 - Type : FILE-FLASH - Revision : 3
2015-08-14 Microsoft Internet Explorer IDataObject bitmap data conversion integer overfl...
RuleID : 35161 - Type : FILE-FLASH - Revision : 3
2015-08-14 Microsoft Internet Explorer IDataObject bitmap data conversion integer overfl...
RuleID : 35160 - Type : FILE-FLASH - Revision : 3
2015-08-14 Microsoft Windows desktop reference use after free attempt
RuleID : 35150 - Type : OS-WINDOWS - Revision : 4
2015-08-14 Microsoft Windows desktop reference use after free attempt
RuleID : 35149 - Type : OS-WINDOWS - Revision : 4
2015-08-14 Microsoft Windows DeferWindowPos access after release code injection attempt
RuleID : 35136 - Type : OS-WINDOWS - Revision : 3
2015-08-14 Microsoft Windows DeferWindowPos access after release code injection attempt
RuleID : 35135 - Type : OS-WINDOWS - Revision : 3
2015-08-14 Microsoft Windows NtUserDisableProcessWindowFiltering information disclosure ...
RuleID : 35132 - Type : OS-WINDOWS - Revision : 3
2015-08-14 Microsoft Windows NtUserDisableProcessWindowFiltering information disclosure ...
RuleID : 35131 - Type : OS-WINDOWS - Revision : 3
2015-08-11 Microsoft Windows ATMFD.dll open font type privilege escalation attempt
RuleID : 35108 - Type : OS-WINDOWS - Revision : 3
2015-08-11 Microsoft Windows ATMFD.dll open font type privilege escalation attempt
RuleID : 35107 - Type : OS-WINDOWS - Revision : 3
2015-08-11 Microsoft Windows ATMFD.dll open font type privilege escalation attempt
RuleID : 35106 - Type : OS-WINDOWS - Revision : 3
2015-08-11 Microsoft Windows ATMFD.dll open font type privilege escalation attempt
RuleID : 35105 - Type : OS-WINDOWS - Revision : 3
2015-06-03 Windows iSCSI target login request Denial of Service attempt
RuleID : 34288 - Type : SERVER-OTHER - Revision : 4
2015-01-13 Microsoft RADIUS Server invalid access-request username denial of service att...
RuleID : 33053 - Type : OS-WINDOWS - Revision : 5

Nessus® Vulnerability Scanner

id Description
2016-06-14 Name: The remote host is affected by a denial of service vulnerability.
File: smb_nt_ms16-081.nasl - Type: ACT_GATHER_INFO
2016-06-14 Name: The remote Windows host is affected by a remote code execution vulnerability.
File: smb_nt_ms16-076.nasl - Type: ACT_GATHER_INFO
2016-06-14 Name: The remote host is affected by multiple vulnerabilities.
File: smb_nt_ms16-073.nasl - Type: ACT_GATHER_INFO
2016-06-14 Name: The remote host is affected by a remote code execution vulnerability.
File: smb_nt_ms16-071.nasl - Type: ACT_GATHER_INFO
2016-04-14 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3548.nasl - Type: ACT_GATHER_INFO
2016-02-09 Name: The remote Windows host is affected by a denial of service vulnerability.
File: smb_nt_ms16-021.nasl - Type: ACT_GATHER_INFO
2016-02-09 Name: The remote Windows host is affected by a denial of service vulnerability.
File: smb_nt_ms16-020.nasl - Type: ACT_GATHER_INFO
2016-01-04 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3433.nasl - Type: ACT_GATHER_INFO
2015-12-21 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_ef434839a6a411e58275000c292e4fd8.nasl - Type: ACT_GATHER_INFO
2015-12-08 Name: The remote host is affected by a remote code execution vulnerability.
File: smb_nt_ms15-127.nasl - Type: ACT_GATHER_INFO
2015-09-08 Name: The remote Windows host is affected by a denial of service vulnerability.
File: smb_nt_ms15-096.nasl - Type: ACT_GATHER_INFO
2015-07-15 Name: The remote Windows host is affected by multiple remote code execution vulnera...
File: smb_nt_ms15-068.nasl - Type: ACT_GATHER_INFO
2015-07-14 Name: The remote Windows host is affected by a privilege escalation vulnerability.
File: smb_nt_ms15-076.nasl - Type: ACT_GATHER_INFO
2015-07-14 Name: The Adobe Font driver on the remote host is affected by a privilege escalatio...
File: smb_nt_ms15-077.nasl - Type: ACT_GATHER_INFO
2015-07-14 Name: The remote Windows host is affected by multiple elevation of privilege vulner...
File: smb_nt_ms15-075.nasl - Type: ACT_GATHER_INFO
2015-07-14 Name: The remote Windows host is affected by a privilege escalation vulnerability.
File: smb_nt_ms15-074.nasl - Type: ACT_GATHER_INFO
2015-07-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms15-073.nasl - Type: ACT_GATHER_INFO
2015-07-14 Name: The remote Windows host is affected by a privilege escalation vulnerability.
File: smb_nt_ms15-072.nasl - Type: ACT_GATHER_INFO
2015-07-14 Name: The remote Windows host is affected by a privilege escalation vulnerability.
File: smb_nt_ms15-071.nasl - Type: ACT_GATHER_INFO
2015-07-14 Name: The remote Windows host is affected by multiple remote code execution vulnera...
File: smb_nt_ms15-069.nasl - Type: ACT_GATHER_INFO
2015-04-14 Name: The remote Windows host is affected by an information disclosure vulnerability.
File: smb_nt_ms15-040.nasl - Type: ACT_GATHER_INFO
2015-03-10 Name: The remote Windows host is affected by a spoofing vulnerability.
File: smb_nt_ms15-027.nasl - Type: ACT_GATHER_INFO
2014-05-14 Name: The remote Windows host is affected by multiple denial of service vulnerabili...
File: smb_nt_ms14-028.nasl - Type: ACT_GATHER_INFO
2014-03-11 Name: The remote Windows host is affected by a security feature bypass vulnerability.
File: smb_nt_ms14-016.nasl - Type: ACT_GATHER_INFO
2013-12-11 Name: The Windows kernel drivers on the remote host are affected by multiple vulner...
File: smb_nt_ms13-101.nasl - Type: ACT_GATHER_INFO