[Winvulns-announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Vulnerabilities to Windows Systems'

Notification of New Vulnerabilties to Windows Systems Fixlet Messages winvulns-announcements at bigmail.bigfix.com
Wed Jul 18 05:25:04 PDT 2012


Fixlet Site - 'Vulnerabilities to Windows Systems'
Current Version: 310	Published: Tue, 17 Jul 2012 20:10:25  GMT

New Fixlets:
============

***************************************************************
Title: ADO Cachesize Heap Overflow RCE Vulnerability - MS12-045
Severity: High
Fixlet ID: 1478301
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval14783.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1891
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Heap-based buffer overflow in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2 and Windows Data Access Components (WDAC) 6.0 allows remote attackers to execute arbitrary code via crafted XML data that triggers access to an uninitialized object in memory, aka "ADO Cachesize Heap Overflow RCE Vulnerability."

***************************************************************
Title: Command Injection Vulnerability - MS12-048
Severity: High
Fixlet ID: 1489701
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval14897.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0175
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: The Shell in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted name for a (1) file or (2) directory, aka "Command Injection Vulnerability."

***************************************************************
Title: The PDF functionality in Google Chrome before 20.0.1132.57 does not properly handle JavaScript code
Severity: High
Fixlet ID: 1503901
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval15039.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2844
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: The PDF functionality in Google Chrome before 20.0.1132.57 does not properly handle JavaScript code, which allows remote attackers to cause a denial of service (incorrect object access) or possibly have unspecified other impact via a crafted document.

***************************************************************
Title: Keyboard Layout Vulnerability - MS12-047
Severity: High
Fixlet ID: 1541601
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval15416.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1890
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle keyboard-layout files, which allows local users to gain privileges via a crafted application, aka "Keyboard Layout Vulnerability."

***************************************************************
Title: Cached Object Remote Code Execution Vulnerability - MS12-044
Severity: High
Fixlet ID: 1546401
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval15464.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1522
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Microsoft Internet Explorer 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Cached Object Remote Code Execution Vulnerability."

***************************************************************
Title: Use-after-free vulnerability in Google Chrome before 20.0.1132.57 via vectors related to layout height tracking
Severity: High
Fixlet ID: 1556901
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval15569.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2843
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Use-after-free vulnerability in Google Chrome before 20.0.1132.57 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to layout height tracking.

***************************************************************
Title: Attribute Remove Remote Code Execution Vulnerability - MS12-044
Severity: High
Fixlet ID: 1559501
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval15595.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1524
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Microsoft Internet Explorer 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Attribute Remove Remote Code Execution Vulnerability."

***************************************************************
Title: TLS Protocol Vulnerability - MS12-049
Severity: Medium
Fixlet ID: 1564401
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval15644.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1870
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: The CBC mode in the TLS protocol, as used in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and other products, allows remote web servers to obtain plaintext data by triggering multiple requests to a third-party HTTPS server and sniffing the network during the resulting HTTPS session, aka "TLS Protocol Vulnerability."

***************************************************************
Title: Win32k Incorrect Type Handling Vulnerability - MS12-047
Severity: High
Fixlet ID: 1565401
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval15654.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1893
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate callback parameters during creation of a hook procedure, which allows local users to gain privileges via a crafted application, aka "Win32k Incorrect Type Handling Vulnerability."

***************************************************************
Title: Use-after-free vulnerability in Google Chrome before 20.0.1132.57 via vectors related to counter handling
Severity: High
Fixlet ID: 1566401
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval15664.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2842
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Use-after-free vulnerability in Google Chrome before 20.0.1132.57 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to counter handling.



More information about the WinVulns-Announcements mailing list