MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2646524)

Medium Nessus Plugin ID 57471


The remote Windows host has a privilege escalation vulnerability.


The Windows Client/Server Run-time Subsystem (CSRSS) on the remote host has a privilege escalation vulnerability that can be triggered when processing a sequence of specially crafted Unicode characters and trying to access the contents of a memory buffer that has not been properly initialized.

If the system is configured with a Chinese, Japanese, or Korean system locale, an attacker who can log into the affected system could leverage this issue by running a malicious application to take complete control of the affected system.


Microsoft has released a set of patches for Windows XP, 2003, Vista, and 2008.

See Also

Plugin Details

Severity: Medium

ID: 57471

File Name: smb_nt_ms12-003.nasl

Version: $Revision: 1.10 $

Type: local

Agent: windows

Published: 2012/01/10

Modified: 2017/07/26

Dependencies: 57033, 13855

Risk Information

Risk Factor: Medium


Base Score: 6.9

Temporal Score: 5.1

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/01/10

Vulnerability Publication Date: 2012/01/10

Reference Information

CVE: CVE-2012-0005

BID: 51270

OSVDB: 78206

MSFT: MS12-003

MSKB: 2646524