Computer Security
[EN] securityvulns.ru
no-pyccku

  

Microsoft Windows multiple security vulnerabilities
Published:20.08.2012
Source:MICROSOFT
SecurityVulns ID:12514
Type:remote
Level:9/10
Description:RDP user-after-free, Remote Administration Protocol multiple security vulnerabilities, Print Spooler Service format string vulnerability, user-after-free in win32k.sys.
CVE:CVE-2012-2527 (Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability.")
 CVE-2012-2526 (The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP3 does not properly process packets in memory, which allows remote attackers to execute arbitrary code by sending crafted RDP packets triggering access to a deleted object, aka "Remote Desktop Protocol Vulnerability.")
 CVE-2012-1853 (Stack-based buffer overflow in the Remote Administration Protocol (RAP) implementation in the LanmanWorkstation service in Microsoft Windows XP SP3 allows remote attackers to execute arbitrary code via crafted RAP response packets, aka "Remote Administration Protocol Stack Overflow Vulnerability.")
 CVE-2012-1852 (Heap-based buffer overflow in the Remote Administration Protocol (RAP) implementation in the LanmanWorkstation service in Microsoft Windows XP SP2 and SP3 allows remote attackers to execute arbitrary code via crafted RAP response packets, aka "Remote Administration Protocol Heap Overflow Vulnerability.")
 CVE-2012-1851 (Format string vulnerability in the Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted response, aka "Print Spooler Service Format String Vulnerability.")
 CVE-2012-1850 (The Remote Administration Protocol (RAP) implementation in the LanmanWorkstation service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle RAP responses, which allows remote attackers to cause a denial of service (service hang) via crafted RAP packets, aka "Remote Administration Protocol Denial of Service Vulnerability.")
Original documentdocumentResearch@NGSSecure, NGS00288 Patch Notification: Windows Remote Desktop Memory Corruption Leading to RCE on XP SP3 (20.08.2012)
Files:Microsoft Security Bulletin MS12-053 - Critical Vulnerability in Remote Desktop Could Allow Remote Code Execution (2723135)
 Microsoft Security Bulletin MS12-054 - Critical Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution (2733594)
 Microsoft Security Bulletin MS12-055 - Important Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2731847)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod

 
 



Rating@Mail.ru