Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2012-1852 | First vendor Publication | 2012-08-14 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Heap-based buffer overflow in the Remote Administration Protocol (RAP) implementation in the LanmanWorkstation service in Microsoft Windows XP SP2 and SP3 allows remote attackers to execute arbitrary code via crafted RAP response packets, aka "Remote Administration Protocol Heap Overflow Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1852 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:15079 | |||
Oval ID: | oval:org.mitre.oval:def:15079 | ||
Title: | Remote Administration Protocol Heap Overflow Vulnerability - MS12-054 | ||
Description: | Heap-based buffer overflow in the Remote Administration Protocol (RAP) implementation in the LanmanWorkstation service in Microsoft Windows XP SP2 and SP3 allows remote attackers to execute arbitrary code via crafted RAP response packets, aka "Remote Administration Protocol Heap Overflow Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1852 | Version: | 3 |
Platform(s): | Microsoft Windows XP | Product(s): | |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 2 |
OpenVAS Exploits
Date | Description |
---|---|
2012-08-15 | Name : Microsoft Windows Networking Components Remote Code Execution Vulnerabilities... File : nvt/secpod_ms12-054.nasl |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2012-08-16 | IAVM : 2012-A-0137 - Multiple Vulnerabilities in Microsoft Windows Networking Components Severity : Category I - VMSKEY : V0033657 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-03-06 | Microsoft Windows SMB Microsoft Windows RAP API NetServerEnum2 long comment b... RuleID : 29513 - Revision : 4 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB RAP API NetServerEnum2 long comment buffer overflow att... RuleID : 24336 - Revision : 12 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB RAP API NetServerEnum2 long server name buffer overflow... RuleID : 24007 - Revision : 15 - Type : OS-WINDOWS |
2014-01-10 | MS-RAP NetServerEnum2 read access violation attempt RuleID : 23847 - Revision : 3 - Type : NETBIOS |
2014-01-10 | Microsoft Windows SMB RAP API NetServerEnum2 long server name buffer overflow... RuleID : 23839 - Revision : 20 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB NetServerEnum response host format string exploit attempt RuleID : 23838 - Revision : 11 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB host announcement format string exploit attempt RuleID : 23837 - Revision : 7 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-08-15 | Name : The remote Windows host is potentially affected by multiple code execution vu... File : smb_nt_ms12-054.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:00:39 |
|
2024-11-28 12:29:32 |
|
2021-05-04 12:19:39 |
|
2021-04-22 01:23:21 |
|
2020-05-23 00:33:23 |
|
2018-10-13 05:18:35 |
|
2017-09-19 09:25:14 |
|
2014-03-06 21:20:47 |
|
2014-02-17 11:09:21 |
|
2014-01-19 21:28:37 |
|
2013-11-11 12:39:52 |
|
2013-11-04 21:22:40 |
|
2013-05-10 22:37:14 |
|
2013-01-30 13:21:23 |
|