CVE-2012-0002 – Microsoft Remote Desktop Protocol Channel Abort Condition Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2012-0002
The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly process packets in memory, which allows remote attackers to execute arbitrary code by sending crafted RDP packets triggering access to an object that (1) was not properly initialized or (2) is deleted, aka "Remote Desktop Protocol Vulnerability." La aplicación Remote Desktop Protocol (RDP) de Microsoft Windows XP SP2 y SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 Service Pack 2, R2 y R2 SP1, y Windows 7 Gold y SP1 no procesa correctamente los paquetes en la memoria, lo que permite a atacantes remotos ejecutar código arbitrario mediante el envío de paquetes RDP modificados que provocan acceso a un objeto que (1) no se ha inicializado correctamente o (2) se suprime, también conocido como "Remote Desktop Protocol Vulnerability." This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft's Remote Desktop Protocol. Authentication is not required to exploit this vulnerability. The specific flaw exists during handling of an error while loading elements into an array. This condition can cause the driver to abort a connection and part of the logic of the abort is to free an object associated with it. • https://www.exploit-db.com/exploits/18606 https://github.com/zhangkaibin0921/MS12-020-CVE-2012-0002 http://blogs.quickheal.com/remote-desktop-protocol-vulnerability-cve-2012-0002-not-dead-yet http://www.securitytracker.com/id?1026790 http://www.us-cert.gov/cas/techalerts/TA12-073A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-020 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14623 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2012-0006
https://notcve.org/view.php?id=CVE-2012-0006
The DNS server in Microsoft Windows Server 2003 SP2 and Server 2008 SP2, R2, and R2 SP1 does not properly handle objects in memory during record lookup, which allows remote attackers to cause a denial of service (daemon restart) via a crafted query, aka "DNS Denial of Service Vulnerability." El servidor DNS en Microsoft Windows Server 2003 SP2 y Server 2008 Service Pack 2, R2 y R2 SP1, no trata correctamente los objetos en la memoria durante la búsqueda de registro, lo que permite a atacantes remotos provocar una denegación de servicio (reinicio del demonio) a través de una consulta modificada, también conocido como "DNS Denial of Service Vulnerability." • http://osvdb.org/80005 http://secunia.com/advisories/48394 http://www.securityfocus.com/bid/52374 http://www.securitytracker.com/id?1026789 http://www.us-cert.gov/cas/techalerts/TA12-073A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-017 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15098 • CWE-399: Resource Management Errors •
CVE-2012-0157
https://notcve.org/view.php?id=CVE-2012-0157
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle window messaging, which allows local users to gain privileges via a crafted application that calls the PostMessage function, aka "PostMessage Function Vulnerability." win32k.sys en los controladores en modo kernel de Microsoft Windows XP SP2 y SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 Service Pack 2, R2 y R2 SP1, y Windows 7 Gold y SP1 no trata correctamente los mensajes de ventana, que permite a usuarios locales conseguir privilegios a través de una aplicación modificada que llama a la función PostMessage, también conocido como "Vulnerabilidad de la función PostMessage." • http://osvdb.org/80002 http://www.us-cert.gov/cas/techalerts/TA12-073A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-018 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14217 • CWE-20: Improper Input Validation •
CVE-2012-0011 – Microsoft Internet Explorer CDispNode t:MEDIA Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2012-0011
Microsoft Internet Explorer 7 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "HTML Layout Remote Code Execution Vulnerability." Microsoft Internet Explorer v7 hasta v9, no maneja apropiadamente los objetos en memoria, lo que permite a atacantes remotos ejecutar código de su elección accediendo a objetos borrados, también conocido como "HTML Layout Remote Code Execution Vulnerability." This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required in that a target must visit a malicious page or open a malicious file. The flaw exists within MSHTML, specifically the handling of an HTML time t:MEDIA element. A t:MEDIA element can be manipulated such that when the page is refreshed a reference to a freed CDispNode object remains allowing the repurpose of this region. • http://www.us-cert.gov/cas/techalerts/TA12-045A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-010 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14310 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2012-0148
https://notcve.org/view.php?id=CVE-2012-0148
afd.sys in the Ancillary Function Driver in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 on 64-bit platforms does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka "AfdPoll Elevation of Privilege Vulnerability." afd.sys en Ancillary Function Driver en Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, y R2 SP1, y Windows 7 Gold y SP1 en plataformas 64-bit, no valida apropiadamente las entradas de usuario pasadas al modo kernel, lo que permite a usuarios locales ganar privilegios a través de una aplicación modificada, también conocido cómo "AfdPoll Elevation of Privilege Vulnerability." • http://www.us-cert.gov/cas/techalerts/TA12-045A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-009 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14852 • CWE-20: Improper Input Validation •