Vulnerability Name:

CVE-2012-0158 (CCN-74372)

Assigned:2011-12-13
Published:2012-04-10
Updated:2018-10-12
Summary:The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2; BizTalk Server 2002 SP1; Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and R2; Visual FoxPro 8.0 SP1 and 9.0 SP2; and Visual Basic 6.0 Runtime allow remote attackers to execute arbitrary code via a crafted (a) web site, (b) Office document, or (c) .rtf file that triggers "system state" corruption, as exploited in the wild in April 2012, aka "MSCOMCTL.OCX RCE Vulnerability."
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.7 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.7 High (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-94
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2012-0158

Source: MISC
Type: UNKNOWN
http://opensources.info/comment-on-the-curious-case-of-a-cve-2012-0158-exploit-by-chris-pierce/

Source: CCN
Type: SA48786
Microsoft Windows Common Control Library ActiveX Control Vulnerability

Source: CCN
Type: Microsoft Security Bulletin MS12-027
Vulnerability in MSCOMCTL.OCX Could Allow Remote Code Execution (2664258)

Source: CCN
Type: Microsoft Security Bulletin MS12-060
Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2720573)

Source: CCN
Type: Microsoft Security Bulletin MS16-004
Security Update for Microsoft Office to Address Remote Code Execution - Critical (3124585)

Source: CCN
Type: Microsoft Security Bulletin MS16-015
Security Update for Microsoft Office to Address Remote Code Execution (3134226)

Source: CCN
Type: Microsoft Security Bulletin MS16-029
Security Update for Microsoft Office to Address Remote Code Execution (3141806)

Source: CCN
Type: Microsoft Security Bulletin MS16-042
Security Update for Microsoft Office (3148775)

Source: CCN
Type: Microsoft Security Bulletin MS16-054
Security Update for Microsoft Office (3155544)

Source: CCN
Type: Microsoft Security Bulletin MS16-070
Security Update for Office (3163610)

Source: CCN
Type: Microsoft Security Bulletin MS16-088
Security Updates for Office (3170008)

Source: CCN
Type: Microsoft Security Bulletin MS16-099
Security Update for Office (3177451)

Source: CCN
Type: Microsoft Security Bulletin MS16-107
Security Update for Microsoft Office (3185852)

Source: CCN
Type: Microsoft Security Bulletin MS16-121
Security Update for Microsoft Office (3194063)

Source: CCN
Type: Microsoft Security Bulletin MS16-133
Security Update for Microsoft Office (3199168)

Source: CCN
Type: Microsoft Security Bulletin MS16-148
Security Update for Microsoft Office (3204068)

Source: CCN
Type: Microsoft Security Bulletin MS17-002
Security Update for Microsoft Office (3214291)

Source: CCN
Type: Microsoft Security Bulletin MS17-013
Security Update for Microsoft Graphics Component (4013075)

Source: CCN
Type: Microsoft Security Bulletin MS17-014
Security Update for Microsoft Office (4013241)

Source: CCN
Type: IBM Security Protection Alert
Microsoft Windows ActiveX Control Code Execution

Source: BID
Type: UNKNOWN
52911

Source: CCN
Type: BID-52911
Microsoft Windows Common Controls ActiveX Control Remote Code Execution Vulnerability

Source: SECTRACK
Type: UNKNOWN
1026899

Source: SECTRACK
Type: UNKNOWN
1026900

Source: SECTRACK
Type: UNKNOWN
1026902

Source: SECTRACK
Type: UNKNOWN
1026903

Source: SECTRACK
Type: UNKNOWN
1026904

Source: SECTRACK
Type: UNKNOWN
1026905

Source: CERT
Type: US Government Resource
TA12-101A

Source: MS
Type: UNKNOWN
MS12-027

Source: XF
Type: UNKNOWN
ms-activex-control-code-execution(74372)

Source: XF
Type: UNKNOWN
ms-activex-control-code-execution(74372)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:15462

Source: CCN
Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY
KNOWN EXPLOITED VULNERABILITIES CATALOG

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [04-25-2012]

Vulnerable Configuration:Configuration 1:
  • cpe:/a:microsoft:office:2003:sp3:*:*:*:*:*:*
  • OR cpe:/a:microsoft:office:2007:sp2:*:*:*:*:*:*
  • OR cpe:/a:microsoft:office:2007:sp3:*:*:*:*:*:*
  • OR cpe:/a:microsoft:office:2010:*:x86:*:*:*:*:*
  • OR cpe:/a:microsoft:office:2010:sp1:x86:*:*:*:*:*
  • OR cpe:/a:microsoft:office_web_components:2003:sp3:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:microsoft:sql_server:2000:sp4:*:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2000:sp4:analysis_services:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2005:sp4:express_advanced_services:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2005:sp4:itanium:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2005:sp4:x64:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2005:sp4:x86:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2008:r2:itanium:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2008:r2:x64:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2008:r2:x86:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2008:sp2:itanium:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2008:sp2:x64:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2008:sp2:x86:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2008:sp3:itanium:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2008:sp3:x64:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2008:sp3:x86:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:microsoft:biztalk_server:2002:sp1:*:*:*:*:*:*
  • OR cpe:/a:microsoft:commerce_server:2002:sp4:*:*:*:*:*:*
  • OR cpe:/a:microsoft:commerce_server:2007:sp2:*:*:*:*:*:*
  • OR cpe:/a:microsoft:commerce_server:2009:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:commerce_server:2009:r2:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:microsoft:visual_basic:6.0:*:runtime_extended_files:*:*:*:*:*
  • OR cpe:/a:microsoft:visual_foxpro:8.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:microsoft:visual_foxpro:9.0:sp2:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:microsoft:visual_basic:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2000:sp4:*:*:*:*:*:*
  • OR cpe:/a:microsoft:office:2003:sp3:*:*:*:*:*:*
  • OR cpe:/a:microsoft:visual_foxpro:8.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:microsoft:visual_foxpro:9.0:sp2:*:*:*:*:*:*
  • OR cpe:/a:microsoft:office:2007:sp2:*:*:*:*:*:*
  • OR cpe:/a:microsoft:office_web_components:2003:sp3:*:*:*:*:*:*
  • OR cpe:/a:microsoft:office:2010::x32:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2005:sp4:itanium:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2008:sp2:itanium:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2008:sp2:x32:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2008:r2:itanium:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2008:r2:x64:*:*:*:*:*
  • OR cpe:/a:microsoft:office:2010:sp1:x32:*:*:*:*:*
  • OR cpe:/a:microsoft:office:2007:sp3:*:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2000:sp4:analysis_services:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2005:sp4:x64:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2008:sp3:x32:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2008:sp2:x64:*:*:*:*:*
  • OR cpe:/a:microsoft:sql_server:2008:sp3:itanium:*:*:*:*:*
  • OR cpe:/a:microsoft:biztalk_server:2002:sp1:*:*:*:*:*:*
  • OR cpe:/a:microsoft:commerce_server:2007:sp2:*:*:*:*:*:*
  • OR cpe:/a:microsoft:commerce_server:2009:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:commerce_server:2009:r2:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:15462
    V
    MSCOMCTL.OCX RCE Vulnerability
    2014-06-09
    BACK
    microsoft office 2003 sp3
    microsoft office 2007 sp2
    microsoft office 2007 sp3
    microsoft office 2010
    microsoft office 2010 sp1
    microsoft office web components 2003 sp3
    microsoft sql server 2000 sp4
    microsoft sql server 2000 sp4
    microsoft sql server 2005 sp4
    microsoft sql server 2005 sp4
    microsoft sql server 2005 sp4
    microsoft sql server 2005 sp4
    microsoft sql server 2008 r2
    microsoft sql server 2008 r2
    microsoft sql server 2008 r2
    microsoft sql server 2008 sp2
    microsoft sql server 2008 sp2
    microsoft sql server 2008 sp2
    microsoft sql server 2008 sp3
    microsoft sql server 2008 sp3
    microsoft sql server 2008 sp3
    microsoft biztalk server 2002 sp1
    microsoft commerce server 2002 sp4
    microsoft commerce server 2007 sp2
    microsoft commerce server 2009
    microsoft commerce server 2009 r2
    microsoft visual basic 6.0
    microsoft visual foxpro 8.0 sp1
    microsoft visual foxpro 9.0 sp2
    microsoft visual basic 6.0
    microsoft sql server 2000 sp4
    microsoft office 2003 sp3
    microsoft visual foxpro 8.0 sp1
    microsoft visual foxpro 9.0 sp2
    microsoft office 2007 sp2
    microsoft office web components 2003 sp3
    microsoft office 2010
    microsoft sql server 2005 sp4
    microsoft sql server 2008 sp2
    microsoft sql server 2008 sp2
    microsoft sql server 2008 r2
    microsoft sql server 2008 r2
    microsoft office 2010 sp1
    microsoft office 2007 sp3
    microsoft sql server 2000 sp4
    microsoft sql server 2005 sp4
    microsoft sql server 2008 sp3
    microsoft sql server 2008 sp2
    microsoft sql server 2008 sp3
    microsoft biztalk server 2002 sp1
    microsoft commerce server 2007 sp2
    microsoft commerce server 2009
    microsoft commerce server 2009 r2