Input validation error in Visual Studio - CVE-2012-0008
Published: March 13, 2012 / Updated: August 11, 2020
Visual Studio
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Untrusted search path vulnerability in Microsoft Visual Studio 2008 SP1, 2010, and 2010 SP1 allows local users to gain privileges via a Trojan horse add-in in an unspecified directory, aka "Visual Studio Add-In Vulnerability." Per: http://technet.microsoft.com/en-us/security/bulletin/ms12-021 'An attacker could then place a specially crafted add-in in the path used by Visual Studio. When Visual Studio is started by an administrator, the specially crafted add-in would be loaded with the same privileges as the administrator.' 'The vulnerability could not be exploited remotely or by anonymous users.' Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426: Untrusted Search Path'
How to mitigate CVE-2012-0008
Sources
- http://secunia.com/advisories/48396
- http://www.securityfocus.com/bid/52329
- http://www.securitytracker.com/id?1026792
- http://www.us-cert.gov/cas/techalerts/TA12-073A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-021
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73537
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15081