Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2012-1856 | First vendor Publication | 2012-08-14 |
Vendor | Cve | Last vendor Modification | 2025-02-10 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 8.8 | ||
Base Score | 8.8 | Environmental Score | 8.8 |
impact SubScore | 5.9 | Temporal Score | 8.8 |
Exploitabality Sub Score | 2.8 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | Required |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL Server 2008 SP2, SP3, R2, R2 SP1, and R2 SP2, Commerce Server 2002 SP4, Commerce Server 2007 SP2, Commerce Server 2009 Gold and R2, Host Integration Server 2004 SP1, Visual FoxPro 8.0 SP1, Visual FoxPro 9.0 SP2, and Visual Basic 6.0 Runtime allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption, aka "MSCOMCTL.OCX RCE Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1856 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:15447 | |||
Oval ID: | oval:org.mitre.oval:def:15447 | ||
Title: | MSCOMCTL.OCX RCE Vulnerability - MS12-060 | ||
Description: | The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL Server 2008 SP2, SP3, R2, R2 SP1, and R2 SP2, Commerce Server 2002 SP4, Commerce Server 2007 SP2, Commerce Server 2009 Gold and R2, Host Integration Server 2004 SP1, Visual FoxPro 8.0 SP1, Visual FoxPro 9.0 SP2, and Visual Basic 6.0 Runtime allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption, aka "MSCOMCTL.OCX RCE Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1856 | Version: | 9 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP | Product(s): | Microsoft Host Integration Server 2004 Microsoft Office 2007 Microsoft Office 2010 Microsoft Office 2003 Microsoft Office 2003 Web Components Microsoft Visual FoxPro 8.0 Microsoft Visual FoxPro 9.0 Microsoft SQL Server 2000 Analysis Services Microsoft SQL Server 2000 Microsoft SQL Server 2005 Microsoft SQL Server 2008 Microsoft SQL Server 2008 R2 Microsoft Commerce Server 2002 Microsoft Commerce Server 2007 Microsoft Commerce Server 2009 Microsoft Commerce Server 2009 R2 Microsoft Visual Basic 6.0 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 | |
Application | 1 | |
Application | 4 | |
Application | 1 | |
Application |
| 8 |
Application | 1 | |
Application | 2 |
OpenVAS Exploits
Date | Description |
---|---|
2012-08-15 | Name : Microsoft Windows Common Controls Remote Code Execution Vulnerability (2720573) File : nvt/secpod_ms12-060.nasl |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2012-08-16 | IAVM : 2012-A-0132 - Microsoft Windows Common Controls Remote Code Execution Vulnerability Severity : Category II - VMSKEY : V0033659 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-04-18 | Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt RuleID : 49496 - Revision : 1 - Type : FILE-OFFICE |
2019-04-18 | Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt RuleID : 49494 - Revision : 1 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office MSComctlLib.Toolbar ActiveX control exploit attempt RuleID : 26832 - Revision : 5 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt RuleID : 24006 - Revision : 14 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office MSCOMCTL ActiveX control tabstrip method arbitrary code exec... RuleID : 23845 - Revision : 8 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt RuleID : 23844 - Revision : 14 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-08-15 | Name : The remote Windows host has a code execution vulnerability. File : smb_nt_ms12-060.nasl - Type : ACT_GATHER_INFO |
2003-01-26 | Name : The remote host has a database server installed. File : mssql_version.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-02-11 17:21:36 |
|
2024-12-19 21:21:26 |
|
2024-11-28 23:00:38 |
|
2024-11-28 12:29:32 |
|
2024-07-16 21:27:56 |
|
2021-05-04 12:19:39 |
|
2021-04-22 01:23:21 |
|
2020-05-23 00:33:23 |
|
2018-11-07 17:19:51 |
|
2018-10-13 05:18:35 |
|
2017-09-19 09:25:14 |
|
2016-04-26 21:43:40 |
|
2014-02-17 11:09:22 |
|
2014-01-30 21:20:36 |
|
2014-01-19 21:28:37 |
|
2013-11-11 12:39:52 |
|
2013-11-04 21:22:40 |
|
2013-05-10 22:37:16 |
|
2013-01-30 13:21:24 |
|