Executive Summary
Informations | |||
---|---|---|---|
Name | TA12-283A | First vendor Publication | 2012-10-09 |
Vendor | US-CERT | Last vendor Modification | 2012-10-09 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Select Microsoft software products contain multiple vulnerabilities. Microsoft has released updates to address these vulnerabilities. Description The Microsoft Security Bulletin Summary for October 2012 describes multiple vulnerabilities in Microsoft software. Microsoft has released updates to address the vulnerabilities. Impact A remote, unauthenticated attacker could execute arbitrary code, cause a denial of service, or gain unauthorized access to your files or system. Solution Apply Updates Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for October 2012, which describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS). Home users are encouraged to enable automatic updates. |
Original Source
Url : http://www.us-cert.gov/cas/techalerts/TA12-283A.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
17 % | CWE-399 | Resource Management Errors |
17 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
17 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
17 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:14976 | |||
Oval ID: | oval:org.mitre.oval:def:14976 | ||
Title: | Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - MS12-066 | ||
Description: | Cross-site scripting (XSS) vulnerability in Microsoft InfoPath 2007 SP2 and SP3 and 2010 SP1, Communicator 2007 R2, Lync 2010 and 2010 Attendee, SharePoint Server 2007 SP2 and SP3 and 2010 SP1, Groove Server 2010 SP1, Windows SharePoint Services 3.0 SP2, SharePoint Foundation 2010 SP1, and Office Web Apps 2010 SP1 allows remote attackers to inject arbitrary web script or HTML via a crafted string, aka "HTML Sanitization Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-2520 | Version: | 13 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP | Product(s): | Microsoft Communicator 2007 R2 Microsoft Groove Server 2010 Microsoft InfoPath 2007 Microsoft InfoPath 2010 Microsoft Lync 2010 Microsoft Lync 2010 Attendee Microsoft Office Web Apps 2010 Microsoft SharePoint Foundation 2010 Microsoft SharePoint Server 2007 Microsoft SharePoint Server 2010 Microsoft SharePoint Services 3.0 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15395 | |||
Oval ID: | oval:org.mitre.oval:def:15395 | ||
Title: | Reflected XSS Vulnerability - MS12-070 | ||
Description: | Cross-site scripting (XSS) vulnerability in the SQL Server Report Manager in Microsoft SQL Server 2000 Reporting Services SP2 and SQL Server 2005 SP4, 2008 SP2 and SP3, 2008 R2 SP1, and 2012 allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka "Reflected XSS Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-2552 | Version: | 10 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP | Product(s): | Microsoft SQL Server 2000 Reporting Services Microsoft SQL Server 2005 Microsoft SQL Server 2008 Microsoft SQL Server 2008 R2 Microsoft SQL Server 2012 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15426 | |||
Oval ID: | oval:org.mitre.oval:def:15426 | ||
Title: | Word PAPX Section Corruption Vulnerability - MS12-064 | ||
Description: | Microsoft Word 2007 SP2 and SP3 does not properly handle memory during the parsing of Word documents, which allows remote attackers to execute arbitrary code via a crafted document, aka "Word PAPX Section Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0182 | Version: | 7 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP | Product(s): | Microsoft Word 2007 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:15674 | |||
Oval ID: | oval:org.mitre.oval:def:15674 | ||
Title: | Kerberos NULL dereference vulnerability - MS12-069 | ||
Description: | The server in Kerberos in Microsoft Windows Server 2008 R2 and R2 SP1, and Windows 7 Gold and SP1, allows remote attackers to cause a denial of service (NULL pointer dereference and reboot) via a crafted session request, aka "Kerberos NULL Dereference Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-2551 | Version: | 3 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 R2 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15680 | |||
Oval ID: | oval:org.mitre.oval:def:15680 | ||
Title: | RTF File listid Use-After-Free Vulnerability - MS12-064 | ||
Description: | Use-after-free vulnerability in Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer; Office Compatibility Pack SP2 and SP3; Word Automation Services on Microsoft SharePoint Server 2010; and Office Web Apps 2010 SP1 allows remote attackers to execute arbitrary code via a crafted RTF document, aka "RTF File listid Use-After-Free Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-2528 | Version: | 15 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP | Product(s): | Microsoft Word 2003 Microsoft Word 2007 Microsoft Word 2010 Microsoft SharePoint Server 2010 Microsoft Office Compatibility Pack Microsoft Office Web Apps 2010 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15867 | |||
Oval ID: | oval:org.mitre.oval:def:15867 | ||
Title: | Windows Kernel Integer Overflow Vulnerability - MS12-068 | ||
Description: | Integer overflow in the kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Windows Kernel Integer Overflow Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-2529 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-10-10 | Name : Microsoft Office Word Remote Code Execution Vulnerabilities (2742319) File : nvt/secpod_ms12-064.nasl |
2012-10-10 | Name : Microsoft Products HTML Sanitisation Component XSS Vulnerability (2741517) File : nvt/secpod_ms12-066.nasl |
2012-10-10 | Name : Microsoft Windows Kernel Privilege Elevation Vulnerability (2724197) File : nvt/secpod_ms12-068.nasl |
2012-10-10 | Name : Microsoft Windows Kerberos Denial of Service Vulnerability (2743555) File : nvt/secpod_ms12-069.nasl |
2012-10-10 | Name : Microsoft SQL Server Report Manager Cross Site Scripting Vulnerability (2754849) File : nvt/secpod_ms12-070.nasl |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2012-10-11 | IAVM : 2012-A-0160 - Microsoft SQL Server Cross-Site Scripting Vulnerability Severity : Category II - VMSKEY : V0034177 |
2012-10-11 | IAVM : 2012-B-0103 - Microsoft Kerberos Denial Of Service Vulnerability Severity : Category I - VMSKEY : V0034180 |
2012-10-11 | IAVM : 2012-B-0102 - Microsoft Works 9 Remote Code Execution Vulnerability Severity : Category II - VMSKEY : V0034182 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Works Word document use after free attempt RuleID : 24588 - Revision : 8 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Works Word document use after free attempt RuleID : 24587 - Revision : 8 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Windows SMB Kerberos NULL session denial of service attempt RuleID : 24360 - Revision : 5 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Office Word rgfc value overflow attempt RuleID : 24358 - Revision : 7 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word rgfc value overflow attempt RuleID : 24357 - Revision : 7 - Type : FILE-OFFICE |
2014-01-10 | Microsoft SQL Server Reporting Services cross site scripting attempt RuleID : 24356 - Revision : 5 - Type : SERVER-MSSQL |
2014-01-10 | Microsoft SQL Server Reporting Services cross site scripting attempt RuleID : 24355 - Revision : 5 - Type : SERVER-MSSQL |
2014-01-10 | Microsoft Office Word RTF malformed listid attempt RuleID : 24354 - Revision : 9 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word RTF malformed listid attempt RuleID : 24353 - Revision : 9 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Works 9 use-after-free attempt RuleID : 24352 - Revision : 7 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Works 9 use-after-free attempt RuleID : 24351 - Revision : 7 - Type : FILE-OFFICE |
2014-01-10 | Microsoft multiple product toStaticHTML XSS attempt RuleID : 23137 - Revision : 11 - Type : BROWSER-IE |
2014-01-10 | Microsoft multiple product toStaticHTML XSS attempt RuleID : 23136 - Revision : 11 - Type : BROWSER-IE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-10-10 | Name : A cross-site scripting vulnerability in SQL Server could allow elevation of p... File : smb_kb2754849.nasl - Type : ACT_GATHER_INFO |
2012-10-10 | Name : A Microsoft Office component installed on the remote host is affected by mult... File : smb_nt_ms12-064.nasl - Type : ACT_GATHER_INFO |
2012-10-10 | Name : The remote Windows host could allow arbitrary code execution. File : smb_nt_ms12-065.nasl - Type : ACT_GATHER_INFO |
2012-10-10 | Name : The remote host is affected by a privilege escalation vulnerability. File : smb_nt_ms12-066.nasl - Type : ACT_GATHER_INFO |
2012-10-10 | Name : The Windows kernel is affected by a vulnerability that could result in privil... File : smb_nt_ms12-068.nasl - Type : ACT_GATHER_INFO |
2012-10-10 | Name : The remote implementation of Kerberos is affected by a denial of service vuln... File : smb_nt_ms12-069.nasl - Type : ACT_GATHER_INFO |
2012-10-10 | Name : A cross-site scripting vulnerability in SQL Server could allow elevation of p... File : smb_nt_ms12-070.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2013-01-30 13:27:35 |
|