==================================================================== CERT-Renater Note d'Information No. 2012/VULN459 ____________________________________________________________________ DATE : 14/11/2012 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S) : Windows version 7, 8, XP, Vista, Server 2003, Server 2008, Server 2012 running Windows Shell. ====================================================================== KB2727528 http://technet.microsoft.com/en-us/security/bulletin/ms12-072 ______________________________________________________________________ Microsoft Security Bulletin MS12-072 - Critical Vulnerabilities in Windows Shell Could Allow Remote Code Execution (2727528) Published Date: November 13, 2012 Version: 1.0 General Information Executive Summary This security update resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited this vulnerability could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This security update is rated Critical for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008 (except for Windows Server 2008 for Itanium-based Systems), Windows 7, Windows Server 2008 R2 (except for Windows Server 2008 R2 for Itanium-based Systems), Windows 8 (except for Windows RT), and Windows Server 2012. Windows Server 2008 for Itanium-based Systems, Windows Server 2008 R2 for Itanium-based Systems, and Windows RT are not affected by the vulnerabilities. Affected Software Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1 Windows 7 for x64-based Systems Windows 7 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows 8 for 32-bit Systems Windows 8 for 64-bit Systems Windows Server 2012 Windows Briefcase Integer Underflow Vulnerability - CVE-2012-1527 A remote code execution vulnerability exists in the Briefcase feature in Windows. An attacker could exploit the vulnerability by convincing a user to open a specially crafted briefcase. An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the current user. Windows Briefcase Integer Overflow Vulnerability - CVE-2012-1528 A remote code execution vulnerability exists in the Briefcase feature in Windows. An attacker could exploit the vulnerability by convincing a user to open a specially crafted Windows Briefcase. An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the current user. ========================================================= Serveur de référence du CERT-Renater https://services.renater.fr/ssi/ ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: certsvp@renater.fr + =========================================================