Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Vulnerability in Visual Studio Team Foundation Server Could Allow Elevation of Privilege (2719584)
Informations
Name MS12-061 First vendor Publication 2012-09-11
Vendor Microsoft Last vendor Modification 2012-09-24
Severity (Vendor) Important Revision 1.1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Revision Note: V1.1 (September 24, 2012): Modified the Recommendation section in the Executive Summary to reflect a change in the way the update is offered. This update is no longer offered automatically, but can be installed by checking online for updates from Microsoft Update. Customers who have already successfully updated their systems do not need to take any action. Also added a link to Microsoft Knowledge Base Article 2719584 under Known Issues in the Executive Summary.

Summary: This security update resolves a privately reported vulnerability in Visual Studio Team Foundation Server. The vulnerability could allow elevation of privilege if a user clicks a specially crafted link in an email message or browses to a webpage that is used to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website.

Original Source

Url : http://technet.microsoft.com/en-us/security/bulletin/ms12-061

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:15779
 
Oval ID: oval:org.mitre.oval:def:15779
Title: XSS Vulnerability - MS12-061
Description: Cross-site scripting (XSS) vulnerability in Microsoft Visual Studio Team Foundation Server 2010 SP1 allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka "XSS Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2012-1892
Version: 5
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Product(s): Microsoft Visual Studio Team Foundation Server 2010
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2012-09-12 Name : MS Visual Studio Team Foundation Server Privilege Elevation Vulnerability (27...
File : nvt/secpod_ms12-061.nasl

Information Assurance Vulnerability Management (IAVM)

Date Description
2012-09-13 IAVM : 2012-B-0090 - Microsoft Visual Studio Team Foundation Server Cross Site Scripting Vulnerabi...
Severity : Category II - VMSKEY : V0033787

Snort® IPS/IDS

Date Description
2014-01-10 Visual Studio Team Web Access console cross site scripting attempt
RuleID : 24137 - Revision : 6 - Type : OS-WINDOWS
2014-01-10 Visual Studio Team Web Access console cross site scripting attempt
RuleID : 24136 - Revision : 6 - Type : OS-WINDOWS
2014-01-10 Visual Studio Team Web Access console cross site scripting attempt
RuleID : 24135 - Revision : 6 - Type : OS-WINDOWS
2014-01-10 Visual Studio Team Web Access console cross site scripting attempt
RuleID : 24134 - Revision : 6 - Type : OS-WINDOWS
2014-01-10 Visual Studio Team Web Access console cross site scripting attempt
RuleID : 24133 - Revision : 6 - Type : OS-WINDOWS
2014-01-10 Visual Studio Team Web Access console cross site scripting attempt
RuleID : 24132 - Revision : 6 - Type : OS-WINDOWS
2014-01-10 Visual Studio Team Web Access console cross site scripting attempt
RuleID : 24131 - Revision : 6 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

Date Description
2012-09-11 Name : The remote host has an application installed that is affected by a cross-site...
File : smb_nt_ms12-061.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2014-02-17 11:47:26
  • Multiple Updates
2014-01-19 21:30:52
  • Multiple Updates
2013-11-11 12:41:30
  • Multiple Updates