Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в Microsoft Windows
дополнено с 11 июля 2012 г.
Опубликовано:26 августа 2012 г.
Источник:
SecurityVulns ID:12464
Тип:библиотека
Уровень опасности:
9/10
Описание:Повреждение памяти в Microsoft XML Services, повреждение памяти в ADO, уязвимости в драйверах ядра, внедрение команд в Windows Shell, уязвимости TLS
Затронутые продукты:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
CVE:CVE-2012-1893 (win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate callback parameters during creation of a hook procedure, which allows local users to gain privileges via a crafted application, aka "Win32k Incorrect Type Handling Vulnerability.")
 CVE-2012-1891 (Heap-based buffer overflow in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2 and Windows Data Access Components (WDAC) 6.0 allows remote attackers to execute arbitrary code via crafted XML data that triggers access to an uninitialized object in memory, aka "ADO Cachesize Heap Overflow RCE Vulnerability.")
 CVE-2012-1890 (win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle keyboard-layout files, which allows local users to gain privileges via a crafted application, aka "Keyboard Layout Vulnerability.")
 CVE-2012-1889 (Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.)
 CVE-2012-1870 (The CBC mode in the TLS protocol, as used in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and other products, allows remote web servers to obtain plaintext data by triggering multiple requests to a third-party HTTPS server and sniffing the network during the resulting HTTPS session, aka "TLS Protocol Vulnerability.")
 CVE-2012-0175 (The Shell in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted name for a (1) file or (2) directory, aka "Command Injection Vulnerability.")
Оригинальный текстdocumentZDI, ZDI-12-158 : Microsoft Internet Explorer MSADO CacheSize Remote Code Execution Vulnerability (26.08.2012)
 documentCORE SECURITY TECHNOLOGIES ADVISORIES, CORE-2011-1123 - Windows Kernel ReadLayoutFile Heap Overflow (18.07.2012)
Файлы:Microsoft Security Bulletin MS12-043 - Critical Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (2722479)
 Microsoft Security Bulletin MS12-044 - Critical Cumulative Security Update for Internet Explorer (2719177)
 Microsoft Security Bulletin MS12-045 - Critical Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution (2698365)
 Microsoft Security Bulletin MS12-047 - Important Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2718523)
 Microsoft Security Bulletin MS12-048 - Important Vulnerability in Windows Shell Could Allow Remote Code Execution (2691442)
 Microsoft Security Bulletin MS12-049 - Important Vulnerability in TLS Could Allow Information Disclosure (2655992)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород