Vulnerabilities > CVE-2012-2528 - Resource Management Errors vulnerability in Microsoft products
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Use-after-free vulnerability in Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer; Office Compatibility Pack SP2 and SP3; Word Automation Services on Microsoft SharePoint Server 2010; and Office Web Apps 2010 SP1 allows remote attackers to execute arbitrary code via a crafted RTF document, aka "RTF File listid Use-After-Free Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 10 |
Common Weakness Enumeration (CWE)
Msbulletin
bulletin_id | MS12-064 |
bulletin_url | |
date | 2012-10-09T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 2742319 |
knowledgebase_url | |
severity | Critical |
title | Vulnerabilities in Microsoft Word Could Allow Remote Code Execution |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS12-064.NASL |
description | The version of Office, Office Compatibility Pack, Microsoft Word Viewer, Microsoft Office Web Apps, and/or Microsoft Share Point Server installed on the remote host is affected by multiple remote code execution vulnerabilities : - A flaw in the way Microsoft Word handles Word files can allow an attacker to execute arbitrary code by tricking a user into opening a specially crafted Word file. (CVE-2012-0182) - A flaw in the way Microsoft Office handles RTF files can be exploited to execute arbitrary code by tricking a user into opening a specially crafted RTF document. (CVE-2012-2528) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 62459 |
published | 2012-10-10 |
reporter | This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/62459 |
title | MS12-064: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2742319) |
Oval
accepted | 2014-06-30T04:05:56.636-04:00 | ||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||
description | Use-after-free vulnerability in Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer; Office Compatibility Pack SP2 and SP3; Word Automation Services on Microsoft SharePoint Server 2010; and Office Web Apps 2010 SP1 allows remote attackers to execute arbitrary code via a crafted RTF document, aka "RTF File listid Use-After-Free Vulnerability." | ||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:15680 | ||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||
submitted | 2012-10-17T10:23:14 | ||||||||||||||||||||||||||||||||||||
title | RTF File listid Use-After-Free Vulnerability - MS12-064 | ||||||||||||||||||||||||||||||||||||
version | 37 |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 55781 CVE(CAN) ID: CVE-2012-2528 Microsoft Word属于办公软件是微软公司的一个文字处理器应用程序。 Microsoft Office处理特制RTF文件时存在远程代码执行漏洞,成功利用此漏洞的攻击者可完全控制受影响系统。 0 Microsoft Word 2010 Microsoft Word 2007 Microsoft Word 2003 Microsoft Office SharePoint Server 2010 Microsoft Office Web Apps 2010 SP1 Microsoft Office Web Apps 2010 0 Microsoft Office Compatibility Pack SP3 Microsoft Office Compatibility Pack SP2 临时解决方法: 如果您不能立刻安装补丁或者升级,建议您采取以下措施以降低威胁: * 以纯文本方式读取电子邮件 * 使用Microsoft Office File Block策略阻止打开来自未知或可疑源和位置的RTF文档。 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS12-064)以及相应补丁: MS12-064:Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2742319) 链接:http://www.microsoft.com/technet/security/bulletin/MS12-064.asp |
id | SSV:60428 |
last seen | 2017-11-19 |
modified | 2012-10-11 |
published | 2012-10-11 |
reporter | Root |
title | Microsoft Word RTF文件释放后重用远程代码执行漏洞(MS12-064) |