MS12-012: Vulnerability in Color Control Panel Could Allow Remote Code Execution (2643719)

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

Arbitrary code can be executed on the remote Windows host through
Windows Color Control Panel.

Description :

The remote host contains a version of Windows Color Control Panel
that is affected by an insecure library loading vulnerability.

A remote attacker could exploit this by tricking a user into opening a
.camp, .cdmp, .gmmp, .icc, or .icm file in a directory that also
contains a malicious 'sti.dll' file, resulting in arbitrary code
execution.

See also :

http://shinnai.altervista.org/exploits/SH-006-20100914.html
http://technet.microsoft.com/en-us/security/bulletin/ms12-012

Solution :

Microsoft has released a set of patches for Windows 2008, and 2008
R2.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 57946 ()

Bugtraq ID: 44157

CVE ID: CVE-2010-5082