MS12-012: Vulnerability in Color Control Panel Could Allow Remote Code Execution (2643719)

This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.

Synopsis :

Arbitrary code can be executed on the remote Windows host through
Windows Color Control Panel.

Description :

The remote host contains a version of Windows Color Control Panel
that is affected by an insecure library loading vulnerability.

A remote attacker could exploit this by tricking a user into opening a
.camp, .cdmp, .gmmp, .icc, or .icm file in a directory that also
contains a malicious 'sti.dll' file, resulting in arbitrary code

See also :

Solution :

Microsoft has released a set of patches for Windows 2008, and 2008

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.7
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 57946 ()

Bugtraq ID: 44157

CVE ID: CVE-2010-5082

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now