Executive Summary
Summary | |
---|---|
Title | Vulnerabilities in Windows Kernel |
Informations | |||
---|---|---|---|
Name | MS12-078 | First vendor Publication | 2012-12-11 |
Vendor | Microsoft | Last vendor Modification | 2012-12-20 |
Severity (Vendor) | Critical | Revision | 2.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V2.0 (December 20, 2012): Rereleased update KB2753842 to resolve an issue with OpenType fonts not properly rendering after the original update was installed. Customers who have successfully installed the original KB2753842 update need to reinstall the update. |
Original Source
Url : http://technet.microsoft.com/en-us/security/bulletin/ms12-078 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:15845 | |||
Oval ID: | oval:org.mitre.oval:def:15845 | ||
Title: | TrueType Font Parsing Vulnerability - MS12-078 | ||
Description: | The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka "TrueType Font Parsing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-4786 | Version: | 7 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP Microsoft Windows 8 Microsoft Windows Server 2012 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:16067 | |||
Oval ID: | oval:org.mitre.oval:def:16067 | ||
Title: | OpenType Font Parsing Vulnerability - MS12-078 | ||
Description: | The OpenType Font (OTF) driver in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to execute arbitrary code via a crafted OpenType font file, aka "OpenType Font Parsing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-2556 | Version: | 7 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP Microsoft Windows 8 Microsoft Windows Server 2012 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-12-12 | Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (... File : nvt/secpod_ms12-078.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2019-04-18 | Microsoft Windows TTF parsing counter overflow attempt RuleID : 49483 - Revision : 1 - Type : FILE-OTHER |
2019-04-18 | Microsoft Windows TTF parsing counter overflow attempt RuleID : 49482 - Revision : 1 - Type : FILE-OTHER |
2014-01-10 | Microsoft Windows ATMFD Adobe font driver reserved command denial of service ... RuleID : 24971 - Revision : 3 - Type : FILE-OTHER |
2014-01-10 | Microsoft Windows TTF parsing counter overflow attempt RuleID : 24650 - Revision : 9 - Type : FILE-OTHER |
2014-01-10 | Microsoft Windows TTF parsing counter overflow attempt RuleID : 24649 - Revision : 8 - Type : FILE-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-12-11 | Name : The remote Windows host is affected by remote code execution vulnerabilities. File : smb_nt_ms12-078.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-04-27 02:00:34 |
|
2014-02-17 11:47:29 |
|
2014-01-19 21:30:54 |
|
2013-02-26 13:20:10 |
|
2012-12-20 21:19:44 |
|
2012-12-20 21:15:51 |
|
2012-12-15 00:21:23 |
|
2012-12-15 00:17:54 |
|
2012-12-12 21:20:16 |
|
2012-12-11 21:21:38 |
|
2012-12-11 21:17:51 |
|