Executive Summary

Summary
Title Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2809279)
Informations
Name MS13-012 First vendor Publication 2013-02-12
Vendor Microsoft Last vendor Modification 2013-02-13
Severity (Vendor) Critical Revision 1.1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Revision Note: V1.1 (February 13, 2013): Clarified that Microsoft Exchange Server 2010 Service Pack 3 is not affected by the vulnerabilities described in this bulletin. This is an informational change only.

Summary: This security update resolves publicly disclosed vulnerabilities in Microsoft Exchange Server. The most severe vulnerability is in Microsoft Exchange Server WebReady Document Viewing, and could allow remote code execution in the security context of the transcoding service on the Exchange server if a user previews a specially crafted file using Outlook Web App (OWA). The transcoding service in Exchange that is used for WebReady Document Viewing is running in the LocalService account. The LocalService account has minimum privileges on the local computer and presents anonymous credentials on the network.

Original Source

Url : http://technet.microsoft.com/en-us/security/bulletin/ms13-012

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:16202
 
Oval ID: oval:org.mitre.oval:def:16202
Title: Vulnerability in Microsoft Exchange Server Could Allow Remote Code Execution - CVE-2013-0393 - MS13-012
Description: Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.7 and 8.4 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2013-0418.
Family: windows Class: vulnerability
Reference(s): CVE-2013-0393
Version: 3
Platform(s): Microsoft Windows Server 2008
Microsoft Windows Server 2003
Microsoft Windows Server 2008 R2
Product(s): Microsoft Exchange Server 2007
Microsoft Exchange Server 2010
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:16251
 
Oval ID: oval:org.mitre.oval:def:16251
Title: Vulnerability in Microsoft Exchange Server Could Allow Remote Code Execution - CVE-2013-0418 - MS13-012
Description: Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.7 and 8.4 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2013-0393. NOTE: the previous information was obtained from the January 2013 CPU. Oracle has not commented on claims from an independent researcher that this is a heap-based buffer overflow in the Paradox database stream filter (vspdx.dll) that can be triggered using a table header with a crafted "number of fields" value.
Family: windows Class: vulnerability
Reference(s): CVE-2013-0418
Version: 4
Platform(s): Microsoft Windows Server 2008
Microsoft Windows Server 2003
Microsoft Windows Server 2008 R2
Product(s): Microsoft Exchange Server 2007
Microsoft Exchange Server 2010
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2
Application 2

Snort® IPS/IDS

Date Description
2015-05-21 Oracle Outside In Paradox database denial of service attempt
RuleID : 34160 - Revision : 3 - Type : SERVER-OTHER
2015-05-21 Oracle CorelDRAW file parser heap buffer overflow attempt
RuleID : 34142 - Revision : 3 - Type : SERVER-OTHER
2015-05-21 Oracle CorelDRAW file parser heap buffer overflow attempt
RuleID : 34141 - Revision : 3 - Type : SERVER-OTHER

Nessus® Vulnerability Scanner

Date Description
2013-02-12 Name : The remote mail server has multiple vulnerabilities.
File : smb_nt_ms13-012.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2015-05-21 21:26:56
  • Multiple Updates
2014-02-17 11:47:33
  • Multiple Updates
2013-10-11 13:30:47
  • Multiple Updates
2013-10-10 13:24:01
  • Multiple Updates
2013-10-09 00:22:47
  • Multiple Updates
2013-02-14 13:26:11
  • Multiple Updates
2013-02-14 05:20:17
  • Multiple Updates
2013-02-14 05:16:42
  • Multiple Updates
2013-02-12 21:22:10
  • Multiple Updates
2013-02-12 21:18:30
  • First insertion