MS12-016: Vulnerability in Microsoft Silverlight Could Allow Remote Code Execution (2651026) (Mac OS X)

high Nessus Plugin ID 58095

Synopsis

A multimedia application framework installed on the remote Mac OS X host is affected by a remote code execution vulnerability.

Description

The version of Microsoft Silverlight installed on the remote host reportedly does not properly use unmanaged objects, which could allow a malicious web application to access memory in an unsafe manner.

An attacker may be able to leverage this vulnerability to execute arbitrary code on the affected system if a user on it can be tricked into viewing a specially crafted web page using a web browser that can run Silverlight applications.

Solution

Microsoft has released a patch for Silverlight 4.

See Also

http://technet.microsoft.com/en-us/security/bulletin/ms12-016

http://www.microsoft.com/download/en/details.aspx?id=28813

Plugin Details

Severity: High

ID: 58095

File Name: macosx_ms12-016.nasl

Version: 1.11

Type: local

Agent: macosx

Published: 2/22/2012

Updated: 7/16/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:microsoft:silverlight

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, MacOSX/Silverlight/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/10/2012

Vulnerability Publication Date: 2/14/2012

Reference Information

CVE: CVE-2012-0014

BID: 51938

MSFT: MS12-016

MSKB: 2668562