MS12-039: Vulnerabilities in Lync Could Allow Remote Code Execution (2707956)

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

Arbitrary code can be executed on the remote host through Microsoft
Lync.

Description :

The remote Windows host is potentially affected by the following
vulnerabilities :

- Multiple code execution vulnerabilities exist in the
handling of specially crafted TrueType font files.
(CVE-2011-3402, CVE-2012-0159)

- An insecure library loading vulnerability exists in the
way that Microsoft Lync handles the loading of DLL
files. (CVE-2012-1849)

- An HTML sanitization vulnerability exists in the way
that HTML is filtered. (CVE-2012-1858)

See also :

http://www.nessus.org/u?c7d49512
http://www.zerodayinitiative.com/advisories/ZDI-12-129
http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0058.html
http://technet.microsoft.com/en-us/security/bulletin/ms12-039

Solution :

Microsoft has released a set of patches for Lync 2010, Lync 2010
Attendee, Lync 2010 Attendant, and Communicator 2007 R2.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 59457 ()

Bugtraq ID: 50462
53335
53831
53842

CVE ID: CVE-2011-3402
CVE-2012-0159
CVE-2012-1849
CVE-2012-1858