MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2646524)

medium Nessus Plugin ID 57471

Synopsis

The remote Windows host has a privilege escalation vulnerability.

Description

The Windows Client/Server Run-time Subsystem (CSRSS) on the remote host has a privilege escalation vulnerability that can be triggered when processing a sequence of specially crafted Unicode characters and trying to access the contents of a memory buffer that has not been properly initialized.

If the system is configured with a Chinese, Japanese, or Korean system locale, an attacker who can log into the affected system could leverage this issue by running a malicious application to take complete control of the affected system.

Solution

Microsoft has released a set of patches for Windows XP, 2003, Vista, and 2008.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2012/ms12-003

Plugin Details

Severity: Medium

ID: 57471

File Name: smb_nt_ms12-003.nasl

Version: 1.12

Type: local

Agent: windows

Published: 1/10/2012

Updated: 11/15/2018

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.1

Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 1/10/2012

Vulnerability Publication Date: 1/10/2012

Reference Information

CVE: CVE-2012-0005

BID: 51270

MSFT: MS12-003

MSKB: 2646524