MS12-046: Vulnerability in Visual Basic for Applications Could Allow Remote Code Execution (2707960)

medium Nessus Plugin ID 59909

Synopsis

Arbitrary code can be executed on the remote host through Visual Basic for Applications.

Description

The version of Visual Basic for Applications installed on the remote host is affected by an insecure library loading vulnerability.

A remote attacker could exploit this flaw by tricking a user into opening a legitimate Microsoft Office file located in the same directory as a maliciously crafted dynamic link library (DLL) file, resulting in arbitrary code execution.

Note that if an affected copy of VBE6.DLL was installed by a third- party application, it may be necessary to contact that application's vendor for an update.

Solution

Microsoft has released a set of patches for Office as well as Visual Basic for Applications Runtime and SDK.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2010/2269637

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2012/ms12-046

Plugin Details

Severity: Medium

ID: 59909

File Name: smb_nt_ms12-046.nasl

Version: 1.12

Type: local

Agent: windows

Published: 7/11/2012

Updated: 12/4/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.1

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2012-1854

Vulnerability Information

CPE: cpe:/a:microsoft:office, cpe:/a:microsoft:visual_basic_software_development_kit

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 7/10/2012

Vulnerability Publication Date: 7/10/2012

Reference Information

CVE: CVE-2012-1854

BID: 54303

IAVA: 2012-A-0109

MSFT: MS12-046

MSKB: 2553447, 2596744, 2598243, 2598361, 2687626, 2688865