CVE-2012-1889
Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- March 22, 2012
- Published Date
- June 13, 2012
- Last Updated
- February 04, 2025
- Vendor
- n/a
- Product
- n/a
- Description
- Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
CVSS Scores
CVSS v3.1
8.8 - HIGH
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
SSVC Information
- Exploitation
- active
- Technical Impact
- total
References
http://www.us-cert.gov/cas/techalerts/TA12-192A.html
http://technet.microsoft.com/security/advisory/2719615
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15195
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-043
http://www.us-cert.gov/cas/techalerts/TA12-174A.html
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2022-06-08 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/msxml_get_definition_code_exec.rb | 2025-04-29 11:01:32 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
msxml_get_definition_code_exec
Type: metasploit • Created: Unknown
Metasploit module for CVE-2012-1889
whu-enjoy/CVE-2012-1889
Type: github • Created: 2016-09-25 06:31:21 UTC • Stars: 4
这里保存着我学习CVE-2012-1889这个漏洞的利用所用到的文件