Vulnerability Details : CVE-2012-1889
Public exploit exists!
Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
Vulnerability category: OverflowMemory CorruptionExecute codeDenial of service
Products affected by CVE-2012-1889
- cpe:2.3:a:microsoft:xml_core_services:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:xml_core_services:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:xml_core_services:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:xml_core_services:5.0:*:*:*:*:*:*:*
CVE-2012-1889 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Microsoft XML Core Services Memory Corruption Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Microsoft XML Core Services contains a memory corruption vulnerability which could allow for remote code execution.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2012-1889
Added on
2022-06-08
Action due date
2022-06-22
Exploit prediction scoring system (EPSS) score for CVE-2012-1889
96.98%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2012-1889
-
MS12-043 Microsoft XML Core Services MSXML Uninitialized Memory Corruption
Disclosure Date: 2012-06-12First seen: 2020-04-26exploit/windows/browser/msxml_get_definition_code_execThis module exploits a memory corruption flaw in Microsoft XML Core Services when trying to access an uninitialized Node with the getDefinition API, which may corrupt memory allowing remote code execution. Authors: - inking26 - binjo - sinn3r <sinn3r@metasploi
CVSS scores for CVE-2012-1889
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2012-1889
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-1889
-
http://technet.microsoft.com/security/advisory/2719615
Microsoft Security Advisory 2719615 | Microsoft DocsVendor Advisory
-
http://www.us-cert.gov/cas/techalerts/TA12-174A.html
Microsoft XML Core Services Attack Activity | CISAUS Government Resource
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15195
Repository / Oval Repository
-
http://www.us-cert.gov/cas/techalerts/TA12-192A.html
Microsoft Updates for Multiple Vulnerabilities | CISAUS Government Resource
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-043
Microsoft Security Bulletin MS12-043 - Critical | Microsoft Docs
Jump to