Vulnerability Name:

CVE-2012-1889 (CCN-76221)

Assigned:2012-06-12
Published:2012-06-12
Updated:2020-09-28
Summary:Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2012-1889

Source: CCN
Type: SA49456
Microsoft XML Core Services Uninitialised Object Vulnerability

Source: CCN
Type: Microsoft Security Advisory (2719615)
Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution

Source: CCN
Type: Microsoft Security Bulletin MS12-043
Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (2722479)

Source: CCN
Type: Microsoft Security Bulletin MS13-002
Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution (2756145)

Source: CCN
Type: Microsoft Security Bulletin MS14-005
Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure (2916036)

Source: CCN
Type: Microsoft Security Bulletin MS14-067
Vulnerability in XML Core Services Could Allow Remote Code Execution

Source: CCN
Type: Microsoft Security Bulletin MS15-084
Vulnerabilities in XML Core Services Could Allow Information Disclosure (3080129)

Source: CCN
Type: Microsoft Security Bulletin MS16-040
Security Update for Microsoft XML Core Service (3148541)

Source: CCN
Type: Microsoft Security Bulletin MS17-022
Security Update for Microsoft XML Core Services (4010321)

Source: CCN
Type: Microsoft Security Bulletin MS14-033
Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure (2966061)

Source: CONFIRM
Type: Vendor Advisory
http://technet.microsoft.com/security/advisory/2719615

Source: CCN
Type: BID-53934
Microsoft XML Core Services CVE-2012-1889 Remote Code Execution Vulnerability

Source: CERT
Type: US Government Resource
TA12-174A

Source: CERT
Type: US Government Resource
TA12-192A

Source: MS
Type: UNKNOWN
MS12-043

Source: XF
Type: UNKNOWN
ms-win-coreservices-code-exec(76221)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:15195

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [06-16-2012]

Source: CCN
Type: Rapid7 Vulnerability and Exploit Database [05-30-2018]
MS12-037 Microsoft Internet Explorer Same ID Property Deleted Object Handling Memory Corruption

Vulnerable Configuration:Configuration 1:
  • cpe:/a:microsoft:xml_core_services:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:xml_core_services:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:xml_core_services:6.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows_7:*:*:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_7:*:*:x86:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_7:-:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_7:-:sp1:*:*:ultimate_n:*:x64:*
  • OR cpe:/o:microsoft:windows_7:-:sp1:*:*:ultimate_n:*:x86:*
  • OR cpe:/o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x32:*
  • OR cpe:/o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:*:sp2:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:microsoft:xml_core_services:5.0:*:*:*:*:*:*:*
  • AND
  • cpe:/a:microsoft:office:2003:sp3:*:*:*:*:*:*
  • OR cpe:/a:microsoft:office:2007:sp2:*:*:*:*:*:*
  • OR cpe:/a:microsoft:office:2007:sp3:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows:server_2003:*:sp2:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:server_2003:*:sp2:*:*:*:itanium:*
  • OR cpe:/o:microsoft:windows:server_2003:*:sp2:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_xp::sp2:x64:*:professional:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp1:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x32:*
  • OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows:xp:sp3:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista::sp2:~~~~x64~:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista::sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x32:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_7:::~~~~x64~:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_7:::x32:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:itanium:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:15195
    V
    MSXML Uninitialized Memory Corruption Vulnerability - MS12-043
    2014-08-18
    BACK
    microsoft xml core services 3.0
    microsoft xml core services 4.0
    microsoft xml core services 6.0
    microsoft windows 7 *
    microsoft windows 7 *
    microsoft windows 7 * sp1
    microsoft windows 7 * sp1
    microsoft windows 7 -
    microsoft windows 7 - sp1
    microsoft windows 7 - sp1
    microsoft windows server 2003 * sp2
    microsoft windows server 2008 * sp2
    microsoft windows server 2008 * sp2
    microsoft windows server 2008 * sp2
    microsoft windows server 2008 - sp2
    microsoft windows server 2008 r2
    microsoft windows server 2008 r2
    microsoft windows vista * sp2
    microsoft windows vista * sp2
    microsoft windows vista - sp2
    microsoft windows xp * sp3
    microsoft windows xp - sp2
    microsoft xml core services 5.0
    microsoft office 2003 sp3
    microsoft office 2007 sp2
    microsoft office 2007 sp3
    microsoft windows server_2003
    microsoft windows server_2003
    microsoft windows server_2003
    microsoft windows xp sp2
    microsoft windows vista sp1
    microsoft windows vista sp1
    microsoft windows server 2008 -
    microsoft windows server 2008 -
    microsoft windows xp sp3
    microsoft windows vista sp2
    microsoft windows vista sp2
    microsoft windows server 2008 sp2
    microsoft windows server 2008 sp2
    microsoft windows 7
    microsoft windows 7
    microsoft windows server 2008 r2
    microsoft windows server 2008
    microsoft windows server 2008 r2