SB2012050801 - Multiple vulnerabilities in Microsoft Windows
Published: May 8, 2012 Updated: March 15, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2012-0165)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper validation of EMF images. A remote attacker can create a specially crafted EMF image file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
2) Improper Input Validation (CVE-ID: CVE-2012-0159)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper processing of a malicious TrueType font (.ttf) within t2embed.dll. A remote attacker can create a specially crafted TrueType font file, trick the victim into loading it and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
3) Improper input validation (CVE-ID: CVE-2012-0180)
The vulnerability allows a local user to obtain elevated privileges on the target system.
The vulnerability exists due to improper managing of functions related to Windows and Messages handling by the kernel-mode driver (win32k.sys). A local attacker can execute arbitrary code on the target system with SYSTEM privileges.
Successful exploitation of this vulnerability will allow the local attacker to obtain elevated privileges on vulnerable system.
4) Improper input validation (CVE-ID: CVE-2012-0181)
The vulnerability allows a local user to obtain elevated privileges on the target system.
The vulnerability exists due to improper managing of Keyboard Layout files by the kernel-mode driver (win32k.sys). A local attacker can execute arbitrary code on vulnerable system with SYSTEM privileges.
Successful exploitation of this vulnerability will allow the local attacker to obtain elevated privileges on vulnerable system.
Note: the vulnerability was being actively exploited.
5) Improper input validation (CVE-ID: CVE-2012-1848)
The vulnerability allows a local user to obtain elevated privileges on the target system.
The vulnerability exists due to error related to scrollbar calculations by the kernel-mode driver (win32k.sys). A local attacker can execute arbitrary code on the target system with SYSTEM privileges.
Successful exploitation of this vulnerability will allow the local attacker to obtain elevated privileges on vulnerable system.
Remediation
Install update from vendor's website.