Vulnerability Details : CVE-2012-0158
The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2; BizTalk Server 2002 SP1; Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and R2; Visual FoxPro 8.0 SP1 and 9.0 SP2; and Visual Basic 6.0 Runtime allow remote attackers to execute arbitrary code via a crafted (a) web site, (b) Office document, or (c) .rtf file that triggers "system state" corruption, as exploited in the wild in April 2012, aka "MSCOMCTL.OCX RCE Vulnerability."
Vulnerability category: Execute code
At least one public exploit which can be used to exploit this vulnerability exists!
CVE-2012-0158
is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Microsoft MSCOMCTL.OCX Remote Code Execution Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Microsoft MSCOMCTL.OCX contains an unspecified vulnerability that allows for remote code execution, allowing an attacker to take complete control of an affected system under the context of the current user.
Added on
2021-11-03
Action due date
2022-05-03
Exploit prediction scoring system (EPSS) score for CVE-2012-0158
Probability of exploitation activity in the next 30 days: 97.29%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2012-0158
-
MS12-027 MSCOMCTL ActiveX Buffer Overflow
Disclosure Date : 2012-04-10exploit/windows/fileformat/ms12_027_mscomctl_bofThis module exploits a stack buffer overflow in MSCOMCTL.OCX. It uses a malicious RTF to embed the specially crafted MSComctlLib.ListViewCtrl.2 Control as exploited in the wild on April 2012. This module targets Office 2007 and Office 2010 targets. The DEP/ASLR bypass on Office 2010 is done with the Ikazuchi ROP chain proposed by Abysssec. This chain uses "msgr3en.dll", which will load after office got load, so the malicious file must be loaded through "File / Open" to achieve exploitation. Authors: - Unknown - juan vazquez <[email protected]> - sinn3r <[email protected]>
CVSS scores for CVE-2012-0158
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
[email protected] |
CWE ids for CVE-2012-0158
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: [email protected] (Primary)
References for CVE-2012-0158
-
http://www.securitytracker.com/id?1026902
-
http://www.securityfocus.com/bid/52911
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15462
-
http://www.securitytracker.com/id?1026904
-
http://www.securitytracker.com/id?1026899
-
http://www.securitytracker.com/id?1026903
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/74372
-
http://www.us-cert.gov/cas/techalerts/TA12-101A.html
US Government Resource
-
http://www.securitytracker.com/id?1026905
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-027
-
http://opensources.info/comment-on-the-curious-case-of-a-cve-2012-0158-exploit-by-chris-pierce/
-
http://www.securitytracker.com/id?1026900
Products affected by CVE-2012-0158
- cpe:2.3:a:microsoft:sql_server:2000:sp4:*:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2008:sp2:x64:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2005:sp4:x64:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2005:sp4:itanium:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2008:r2:itanium:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2008:sp2:itanium:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2008:r2:x64:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2005:sp4:express_advanced_services:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2008:sp3:x64:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2008:sp2:x86:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2008:sp3:x86:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2000:sp4:analysis_services:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2008:sp3:itanium:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2005:sp4:x86:*:*:*:*:*
- cpe:2.3:a:microsoft:sql_server:2008:r2:x86:*:*:*:*:*
- cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office:2010:*:x86:*:*:*:*:*
- cpe:2.3:a:microsoft:office:2010:sp1:x86:*:*:*:*:*
- cpe:2.3:a:microsoft:visual_basic:6.0:*:runtime_extended_files:*:*:*:*:*
- cpe:2.3:a:microsoft:commerce_server:2002:sp4:*:*:*:*:*:*
- cpe:2.3:a:microsoft:commerce_server:2007:sp2:*:*:*:*:*:*
- cpe:2.3:a:microsoft:commerce_server:2009:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:commerce_server:2009:r2:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office_web_components:2003:sp3:*:*:*:*:*:*
- cpe:2.3:a:microsoft:visual_foxpro:9.0:sp2:*:*:*:*:*:*
- cpe:2.3:a:microsoft:visual_foxpro:8.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:microsoft:biztalk_server:2002:sp1:*:*:*:*:*:*