Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2012-2526 | First vendor Publication | 2012-08-14 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP3 does not properly process packets in memory, which allows remote attackers to execute arbitrary code by sending crafted RDP packets triggering access to a deleted object, aka "Remote Desktop Protocol Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2526 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:15650 | |||
Oval ID: | oval:org.mitre.oval:def:15650 | ||
Title: | Remote Desktop Protocol Vulnerability - MS12-053 | ||
Description: | The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP3 does not properly process packets in memory, which allows remote attackers to execute arbitrary code by sending crafted RDP packets triggering access to a deleted object, aka "Remote Desktop Protocol Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-2526 | Version: | 3 |
Platform(s): | Microsoft Windows XP | Product(s): | |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2012-08-15 | Name : Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2723135) File : nvt/secpod_ms12-053.nasl |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2012-08-16 | IAVM : 2012-A-0131 - Microsoft Remote Desktop Remote Code Execution Vulnerability Severity : Category I - VMSKEY : V0033658 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows Terminal server RDP freed memory write attempt RuleID : 23846 - Revision : 6 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-08-15 | Name : The remote Windows host is affected by a code execution vulnerability. File : smb_nt_ms12-053.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:00:38 |
|
2024-11-28 12:30:00 |
|
2021-05-04 12:19:57 |
|
2021-04-22 01:23:41 |
|
2020-05-23 00:33:39 |
|
2018-10-13 05:18:36 |
|
2017-09-19 09:25:17 |
|
2016-09-22 21:25:29 |
|
2014-02-17 11:10:28 |
|
2014-01-19 21:28:45 |
|
2013-11-11 12:39:56 |
|
2013-11-04 21:22:56 |
|
2013-05-10 22:39:38 |
|
2013-01-30 13:21:38 |
|