Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2012-0180 | First vendor Publication | 2012-05-08 |
Vendor | Cve | Last vendor Modification | 2025-01-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly handle user-mode input passed to kernel mode for (1) windows and (2) messages, which allows local users to gain privileges via a crafted application, aka "Windows and Messages Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0180 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:15466 | |||
Oval ID: | oval:org.mitre.oval:def:15466 | ||
Title: | Windows and Messages Vulnerability | ||
Description: | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly handle user-mode input passed to kernel mode for (1) windows and (2) messages, which allows local users to gain privileges via a crafted application, aka "Windows and Messages Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0180 | Version: | 19 |
Platform(s): | Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2012-05-18 | Windows XP Keyboard Layouts Pool Corruption LPE 0day PoC (post-MS12-034) |
OpenVAS Exploits
Date | Description |
---|---|
2012-05-14 | Name : Microsoft Silverlight Code Execution Vulnerabilities - 2681578 (Mac OS X) File : nvt/secpod_ms12-034_macosx.nasl |
2012-05-09 | Name : MS Security Update For Microsoft Office, .NET Framework, and Silverlight (268... File : nvt/secpod_ms12-034.nasl |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2012-05-10 | IAVM : 2012-A-0079 - Combined Security Update for Microsoft Office Windows .NET Framework and Silv... Severity : Category I - VMSKEY : V0032304 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows True Type Font maxComponentPoints overflow attempt RuleID : 27576 - Revision : 5 - Type : FILE-OTHER |
2014-01-10 | Microsoft .NET framework malicious XBAP attempt RuleID : 22090 - Revision : 6 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows True Type Font maxComponentPoints overflow attempt RuleID : 22087 - Revision : 9 - Type : FILE-OTHER |
2014-01-10 | Microsoft Office GDI+ incorrect index validation of malformed EMF image attempt RuleID : 22086 - Revision : 5 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office GDI+ incorrect index validation of malformed EMF image attempt RuleID : 22085 - Revision : 5 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-05-09 | Name : A multimedia application framework installed on the remote Mac OS X host is a... File : macosx_ms12-034.nasl - Type : ACT_GATHER_INFO |
2012-05-09 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms12-034.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-01-22 00:20:58 |
|
2024-11-28 23:02:03 |
|
2024-11-28 12:28:26 |
|
2024-08-02 12:18:40 |
|
2024-08-02 01:05:31 |
|
2024-02-02 01:18:08 |
|
2024-02-01 12:05:23 |
|
2023-12-07 21:28:01 |
|
2023-09-05 12:17:03 |
|
2023-09-05 01:05:15 |
|
2023-09-02 12:17:07 |
|
2023-09-02 01:05:21 |
|
2023-08-12 12:20:49 |
|
2023-08-12 01:05:22 |
|
2023-08-11 12:17:13 |
|
2023-08-11 01:05:31 |
|
2023-08-06 12:16:33 |
|
2023-08-06 01:05:22 |
|
2023-08-04 12:16:37 |
|
2023-08-04 01:05:23 |
|
2023-07-14 12:16:36 |
|
2023-07-14 01:05:20 |
|
2023-03-29 01:18:33 |
|
2023-03-28 12:05:28 |
|
2022-10-11 12:14:49 |
|
2022-10-11 01:05:04 |
|
2021-05-04 12:18:58 |
|
2021-04-22 01:22:42 |
|
2020-09-28 17:22:44 |
|
2020-05-23 00:32:36 |
|
2019-02-26 17:19:37 |
|
2018-10-13 05:18:34 |
|
2018-09-20 12:09:30 |
|
2017-12-05 09:22:03 |
|
2017-09-19 09:25:07 |
|
2016-09-30 01:03:30 |
|
2016-06-28 18:58:35 |
|
2016-04-26 21:24:18 |
|
2014-02-17 11:07:09 |
|
2013-05-10 22:31:41 |
|
2013-01-30 13:21:13 |
|