ID |
CVE-2012-0009
|
Summary |
Untrusted search path vulnerability in the Windows Object Packager configuration in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a Trojan horse executable file in the current working directory, as demonstrated by a directory that contains a file with an embedded packaged object, aka "Object Packager Insecure Executable Launching Vulnerability." Per: http://technet.microsoft.com/en-us/security/bulletin/ms12-002
'The vulnerability could allow remote code execution if a user opens a legitimate file with an embedded packaged object that is located in the same network directory as a specially crafted executable file.' Per: http://cwe.mitre.org/data/definitions/426.html
'CWE-426: Untrusted Search Path' |
References |
|
Vulnerable Configurations |
-
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
|
CVSS |
Base: | 9.3 (as of 26-02-2019 - 14:04) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
msbulletin
via4
|
bulletin_id | MS12-002 | bulletin_url | | date | 2012-01-10T00:00:00 | impact | Remote Code Execution | knowledgebase_id | 2603381 | knowledgebase_url | | severity | Important | title | Vulnerability in Windows Object Packager Could Allow Remote Code Execution |
|
oval
via4
|
accepted | 2012-02-20T04:00:05.379-05:00 | class | vulnerability | contributors | name | Josh Turpin | organization | Symantec Corporation |
| definition_extensions | comment | Microsoft Windows XP (x86) SP3 is installed | oval | oval:org.mitre.oval:def:5631 |
comment | Microsoft Windows XP x64 Edition SP2 is installed | oval | oval:org.mitre.oval:def:4193 |
comment | Microsoft Windows Server 2003 SP2 (x86) is installed | oval | oval:org.mitre.oval:def:1935 |
comment | Microsoft Windows Server 2003 SP2 (x64) is installed | oval | oval:org.mitre.oval:def:2161 |
comment | Microsoft Windows Server 2003 (ia64) SP2 is installed | oval | oval:org.mitre.oval:def:1442 |
| description | Untrusted search path vulnerability in the Windows Object Packager configuration in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a Trojan horse executable file in the current working directory, as demonstrated by a directory that contains a file with an embedded packaged object, aka "Object Packager Insecure Executable Launching Vulnerability." | family | windows | id | oval:org.mitre.oval:def:14393 | status | accepted | submitted | 2012-01-10T13:00:00 | title | Object Packager Insecure Executable Launching Vulnerability | version | 26 |
|
refmap
via4
|
bid | 51297 | cert | TA12-010A | sectrack | 1026494 | secunia | 45189 |
|
saint
via4
|
bid | 51297 | description | Windows Object Packager Insecure Execution | id | win_patch_ms12002 | osvdb | 78212 | title | windows_object_packager_insecure_exec | type | client |
|
Last major update |
26-02-2019 - 14:04 |
Published |
10-01-2012 - 21:55 |
Last modified |
26-02-2019 - 14:04 |