Vulnerabilities > CVE-2012-2553 - Resource Management Errors vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 6 |
Common Weakness Enumeration (CWE)
Msbulletin
bulletin_id | MS12-075 |
bulletin_url | |
date | 2012-11-13T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 2761226 |
knowledgebase_url | |
severity | Critical |
title | Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS12-075.NASL |
description | The remote Windows host is affected by the following remote code execution vulnerabilities: - Two use-after-free vulnerabilities exist within Windows kernel-mode drivers. (CVE-2012-2530, CVE-2012-2553) - A TrueType Font Parsing vulnerability exists due to the way TrueType font files are handled. (CVE-2012-2897) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 62907 |
published | 2012-11-14 |
reporter | This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/62907 |
title | MS12-075: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2761226) |
code |
|
Oval
accepted | 2013-05-06T04:01:41.418-04:00 | ||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||
description | Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability." | ||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||
id | oval:org.mitre.oval:def:15817 | ||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||
submitted | 2012-11-16T11:27:12 | ||||||||||||||||||||||||
title | Win32k Use After Free Vulnerability - MS12-075 | ||||||||||||||||||||||||
version | 74 |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 56448 CVE ID: CVE-2012-2553 Microsoft Windows是微软发布的非常流行的操作系统。 Microsoft Windows XP SP3、Windows Server 2003 SP2、Windows Vista SP2、Windows Server 2008 SP2、Windows 7 Gold/SP1内核模式驱动程序内的win32k.sys存在释放后重新漏洞,通过特制的应用,可允许本地用户获取权限。 0 Microsoft Windows 8 Microsoft Windows 7 Microsoft Windows XP Professional Microsoft Windows XP Home Edition Microsoft Windows Vista Microsoft Windows Storage Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2003 Web Edition Microsoft Windows Server 2003 Standard Edition Microsoft Windows Server 2003 Enterprise Editi Microsoft Windows Server 2003 Datacenter Editi 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS12-075)以及相应补丁: MS12-075:Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2761226) 链接:http://www.microsoft.com/technet/security/bulletin/MS12-075.asp |
id | SSV:60464 |
last seen | 2017-11-19 |
modified | 2012-11-19 |
published | 2012-11-19 |
reporter | Root |
title | Microsoft Windows Kernel 'Win32k.sys' 本地权限提升漏洞(CVE-2012-2553) (MS12-075) |
References
- http://secunia.com/advisories/51239
- http://secunia.com/advisories/51239
- http://www.securityfocus.com/bid/56448
- http://www.securityfocus.com/bid/56448
- http://www.securitytracker.com/id?1027750
- http://www.securitytracker.com/id?1027750
- http://www.us-cert.gov/cas/techalerts/TA12-318A.html
- http://www.us-cert.gov/cas/techalerts/TA12-318A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-075
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-075
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15817
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15817