Microsoft Windows Common Controls ActiveX Control Remote Code Execution Vulnerability



Microsoft Windows Common Controls is prone to a remote code-execution vulnerability.

An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage.

Successful exploits will allow the attacker to execute arbitrary code within the context of the application (typically Internet Explorer) that uses the ActiveX control.

Information

Bugtraq ID: 52911
Class: Design Error
CVE: CVE-2012-0158

Remote: Yes
Local: No
Published: Apr 10 2012 12:00AM
Updated: Sep 25 2017 08:00PM
Credit: Microsoft
Vulnerable: Microsoft Visual FoxPro 9.0 SP2
Microsoft Visual FoxPro 9.0 SP1
Microsoft Visual FoxPro 8.0 SP1
Microsoft Visual FoxPro 8.0
Microsoft Visual Basic 6.0
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
Microsoft SQL Server 2008 x64 SP3
Microsoft SQL Server 2008 x64 SP2
Microsoft SQL Server 2008 itanium SP3
Microsoft SQL Server 2008 itanium SP2
Microsoft SQL Server 2008 itanium SP1
Microsoft SQL Server 2008 itanium R2
Microsoft SQL Server 2008 32bit SP3
Microsoft SQL Server 2008 32bit SP2
Microsoft SQL Server 2008 32bit R2
Microsoft SQL Server 2008 R2 SP1
Microsoft SQL Server 2008 R2
Microsoft SQL Server 2008 0
Microsoft SQL Server 2005 x64 Edition SP4
Microsoft SQL Server 2005 x64 Edition SP3
Microsoft SQL Server 2005 x64 Edition SP2
Microsoft SQL Server 2005 x64 Edition SP1
Microsoft SQL Server 2005 Itanium Edition SP4
Microsoft SQL Server 2005 Itanium Edition SP3
Microsoft SQL Server 2005 Itanium Edition SP2
Microsoft SQL Server 2005 Itanium Edition SP1
Microsoft SQL Server 2005 Itanium Edition 0
Microsoft SQL Server 2005 Express Edition SP4
Microsoft SQL Server 2005 Express Edition SP3
Microsoft SQL Server 2005 Express Edition SP2
Microsoft SQL Server 2005 Express Edition SP1
Microsoft SQL Server 2000 SP4
Microsoft SQL Server 2000 SP3
Microsoft SQL Server 2000 SP2
Microsoft SQL Server 2000 SP1
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
Microsoft SQL Server 2000
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0
Microsoft Office 2010 (32-bit edition) 0
Microsoft Office 2010 0
Microsoft Office 2010 (32-bit edition) SP1
Microsoft Office 2007 SP2
Microsoft Office 2007 SP1
Microsoft Office 2003 Web Components SP3
Microsoft Office 2003 SP3
Microsoft Office 2003 SP2
Microsoft Office 2003 SP1
Microsoft Commerce Server 2009 R2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2009 0
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2007 SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2007 SP1
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2007 0
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2002 SP4
Microsoft Commerce Server 2002 SP3
Microsoft Commerce Server 2002 SP2
Microsoft Commerce Server 2002 SP1
Microsoft BizTalk Server 2002 SP1
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server


Not Vulnerable:

Exploit


This vulnerability is being exploited as part of multiple cyber espionage and cybercrime campaigns identified in Symantec MATI reports SYMC - 300053, SYMC - 300064, SYMC - 300088, SYMC - 300120, SYMC - 300147, SYMC - 300152, SYMC - 300159, SYMC - 300185, SYMC - 300260, SYMC - 300273, SYMC - 300365, SYMC - 300451, SYMC - 300496, SYMC - 300514, and SYMC - 300633.

The following exploit code is available:


Related Posts

Comments