Check Point Reference: | CPAI-2012-308 |
Date Published: | 10 Jul 2012 |
Severity: | Critical |
Last Updated: | Sunday 01 January, 2012 |
Source: | CVE-2012-1889 |
Protection Provided by: | |
Who is Vulnerable? | Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 |
Vulnerability Description | A remote code execution vulnerability has been reported in Microsoft XML Core Services. |
Update/Patch Avaliable | Apply patches from: MS12-043 |
Vulnerability Details | The vulnerability is caused due to a memory corruption when MSXML Core Services attempts to access an object in memory that has not been initialized. A remote attacker may exploit this vulnerability by enticing a target user to view a specially crafted web page. Successful exploitation could allow an attacker to execute arbitrary code on the target system, in the security context of the logged on user. |