CERTA-2012-ALE-004
Vulnerability from certfr_alerte

Une vulnérabilité a été découverte dans les bibliothèques « Oracle Outside In » utilisées par le service de transcodage de documents. Dans le cas le plus grave, un attaquant peut alors prendre le contrôle d'un serveur au moyen d'un fichier ou d'un message spécialement conçu.

Contournement provisoire

Se référer à l'avis de sécurité de sécurité Microsoft 2737111 (cf. section Documentation).

Solution

Appliquer le correctif de Microsoft MS12-058 (cf. section Documentation).

None
Impacted products
Vendor Product Description
Microsoft N/A Microsoft Exchange Server 2010 Service Pack 1 ;
Microsoft N/A FAST Search Server 2010 pour SharePoint.
Microsoft N/A Microsoft Exchange Server 2010 Service Pack 2 ;
Microsoft N/A Microsoft SharePoint Server 2010 Service Pack 1 ;
Microsoft N/A Microsoft Exchange Server 2007 Service Pack 3 ;

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Microsoft Exchange Server 2010 Service Pack 1 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "FAST Search Server 2010 pour SharePoint.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft Exchange Server 2010 Service Pack 2 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft SharePoint Server 2010 Service Pack 1 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft Exchange Server 2007 Service Pack 3 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "closed_at": "2012-08-16",
  "content": "## Contournement provisoire\n\nSe r\u00e9f\u00e9rer \u00e0 l\u0027avis de s\u00e9curit\u00e9 de s\u00e9curit\u00e9 Microsoft 2737111 (cf.\nsection Documentation).\n\n## Solution\n\nAppliquer le correctif de Microsoft MS12-058 (cf. section\nDocumentation).\n",
  "cves": [
    {
      "name": "CVE-2012-1771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1771"
    },
    {
      "name": "CVE-2012-1772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1772"
    },
    {
      "name": "CVE-2012-3108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3108"
    },
    {
      "name": "CVE-2012-1768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1768"
    },
    {
      "name": "CVE-2012-1773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1773"
    },
    {
      "name": "CVE-2012-3107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3107"
    },
    {
      "name": "CVE-2012-1770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1770"
    },
    {
      "name": "CVE-2012-1766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1766"
    },
    {
      "name": "CVE-2012-3109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3109"
    },
    {
      "name": "CVE-2012-3110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3110"
    },
    {
      "name": "CVE-2012-3106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3106"
    },
    {
      "name": "CVE-2012-1769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1769"
    },
    {
      "name": "CVE-2012-1767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1767"
    }
  ],
  "initial_release_date": "2012-07-25T00:00:00",
  "last_revision_date": "2012-08-16T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Oracle juillet 2012 :",
      "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS12-058 :",
      "url": "http://technet.microsoft.com/fr-fr/security/bulletin/ms12-058"
    },
    {
      "title": "Avis du CERTA CERTA-2012-AVI-441 :",
      "url": "http://www.certa.ssi.gouv.fr/site/CERTA-2012-AVI-441/index.html"
    }
  ],
  "reference": "CERTA-2012-ALE-004",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2012-07-25T00:00:00.000000"
    },
    {
      "description": "ajout de la solution.",
      "revision_date": "2012-08-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les biblioth\u00e8ques \u00ab Oracle\nOutside In \u00bb utilis\u00e9es par le service de transcodage de documents. Dans\nle cas le plus grave, un attaquant peut alors prendre le contr\u00f4le d\u0027un\nserveur au moyen d\u0027un fichier ou d\u0027un message sp\u00e9cialement con\u00e7u.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Microsoft Exchange et Fast Search Server 2010",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Avis de s\u00e9curit\u00e9 Microsoft 2737111 du 24 juillet 2012",
      "url": "http://technet.microsoft.com/en-us/security/advisory/2737111"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…