Vulnerabilities > CVE-2012-2530 - Resource Management Errors vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 13 |
Common Weakness Enumeration (CWE)
Msbulletin
bulletin_id | MS12-075 |
bulletin_url | |
date | 2012-11-13T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 2761226 |
knowledgebase_url | |
severity | Critical |
title | Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS12-075.NASL |
description | The remote Windows host is affected by the following remote code execution vulnerabilities: - Two use-after-free vulnerabilities exist within Windows kernel-mode drivers. (CVE-2012-2530, CVE-2012-2553) - A TrueType Font Parsing vulnerability exists due to the way TrueType font files are handled. (CVE-2012-2897) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 62907 |
published | 2012-11-14 |
reporter | This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/62907 |
title | MS12-075: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2761226) |
code |
|
Oval
accepted | 2013-05-06T04:01:45.791-04:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
description | Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability." | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:15936 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
submitted | 2012-11-16T11:27:12 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
title | Win32k Use After Free Vulnerability - MS12-075 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
version | 74 |
References
- http://secunia.com/advisories/51239
- http://secunia.com/advisories/51239
- http://www.securitytracker.com/id?1027750
- http://www.securitytracker.com/id?1027750
- http://www.us-cert.gov/cas/techalerts/TA12-318A.html
- http://www.us-cert.gov/cas/techalerts/TA12-318A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-075
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-075
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15936
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15936