MS12-043: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (2722479)

high Nessus Plugin ID 59906

Synopsis

Arbitrary code can be executed on the remote host through Microsoft XML Core Services.

Description

The version of Microsoft XML Core Services installed on the remote Windows host is affected by a remote code execution vulnerability that could allow arbitrary code execution if a user views a specially crafted web page using Internet Explorer.

Solution

Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, and 2008 R2.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2012/ms12-043

https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2012/2719615

Plugin Details

Severity: High

ID: 59906

File Name: smb_nt_ms12-043.nasl

Version: 1.27

Type: local

Agent: windows

Published: 7/11/2012

Updated: 6/8/2022

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2012-1889

Vulnerability Information

CPE: cpe:/a:microsoft:xml_core_services

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/10/2012

Vulnerability Publication Date: 6/12/2012

CISA Known Exploited Vulnerability Due Dates: 6/22/2022

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (MS12-043 Microsoft XML Core Services MSXML Uninitialized Memory Corruption)

Reference Information

CVE: CVE-2012-1889

BID: 53934