Vulnerabilities > CVE-2012-2539 - Out-of-bounds Write vulnerability in Microsoft products
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer; Office Compatibility Pack SP2 and SP3; and Office Web Apps 2010 SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, aka "Word RTF 'listoverridecount' Remote Code Execution Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 9 |
Common Weakness Enumeration (CWE)
Msbulletin
bulletin_id | MS12-079 |
bulletin_url | |
date | 2012-12-11T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 2780642 |
knowledgebase_url | |
severity | Critical |
title | Vulnerability in Microsoft Word Could Allow Remote Code Execution |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS12-079.NASL |
description | The version of Office, Office Compatibility Pack, Microsoft Word Viewer, Microsoft Office Web Apps, and/or Microsoft Share Point Server installed on the remote host has a remote code execution vulnerability. This is due to the way that Microsoft Office software parses RTF data and could allow an attacker to execute arbitrary code by tricking a user into opening a specially crafted RTF file. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 63226 |
published | 2012-12-11 |
reporter | This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/63226 |
title | MS12-079: Vulnerability in Microsoft Word Could Allow Remote Code Execution (2780642) |
Oval
accepted | 2014-06-30T04:05:58.092-04:00 | ||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||
description | Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer; Office Compatibility Pack SP2 and SP3; and Office Web Apps 2010 SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, aka "Word RTF 'listoverridecount' Remote Code Execution Vulnerability." | ||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:16073 | ||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||
submitted | 2012-12-12T09:41:18 | ||||||||||||||||||||||||||||||||||||
title | Word RTF 'listoverridecount' Remote Code Execution Vulnerability - MS12-079 | ||||||||||||||||||||||||||||||||||||
version | 35 |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 56834 CVE(CAN) ID: CVE-2012-2539 Microsoft Word 属于办公软件是微软公司的一个文字处理器应用程序。 Microsoft Word 在解析listoverridecount相关的RTF(Rich Text Format)数据时存在漏洞。通过诱使用户浏览恶意网站或在e-mail邮件中打开特定格式的rtf文件,未经身份验证的远程攻击者可利用此漏洞以当前用户权限执行任意代码。 0 Microsoft Office 2003 Professional Edition Microsoft Office Word Viewer Microsoft Office Web Apps Microsoft Office Compatibility Pack for Word, Microsoft Office 2010 Microsoft Office 2007 Microsoft Office 2003 Student and Teacher Edi Microsoft Office 2003 Standard Edition Microsoft Office 2003 Small Business Edition Microsoft SharePoint Server 2010 临时解决方法: * 以纯文本形式读取电子邮件。 * 使用Microsoft Office File Block策略阻止打开未知或可疑源和位置的RTF文档。 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS12-079)以及相应补丁: MS12-079:Vulnerability in Microsoft Word Could Allow Remote Code Execution (2780642) 链接:http://www.microsoft.com/technet/security/bulletin/MS12-079.mspx 补丁下载:http://update.microsoft.com/ |
id | SSV:60511 |
last seen | 2017-11-19 |
modified | 2012-12-13 |
published | 2012-12-13 |
reporter | Root |
title | Microsoft Word RTF File 'listoverridecount'远程代码执行漏洞(MS12-079) |
References
- http://www.us-cert.gov/cas/techalerts/TA12-346A.html
- http://www.us-cert.gov/cas/techalerts/TA12-346A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-079
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-079
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16073
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16073