Vulnerability Details : CVE-2012-5896
Public exploit exists!
The Annotation Objects Extension ActiveX control in AnnotateX.dll in Quest InTrust 10.4.0.853 and earlier does not properly implement the Add method, which allows remote attackers to execute arbitrary code via a memory address in the first argument, related to an "uninitialized pointer."
Vulnerability category: Execute code
Products affected by CVE-2012-5896
- cpe:2.3:a:quest:intrust:*:*:*:*:*:*:*:*
- cpe:2.3:a:quest:intrust:10.1:*:*:*:*:*:*:*
- cpe:2.3:a:quest:intrust:10.4:*:*:*:*:*:*:*
- cpe:2.3:a:quest:intrust:10.3:*:*:*:*:*:*:*
- cpe:2.3:a:quest:intrust:10.2.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-5896
66.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2012-5896
-
Quest InTrust Annotation Objects Uninitialized Pointer
Disclosure Date: 2012-03-28First seen: 2020-04-26exploit/windows/browser/intrust_annotatex_addThis module exploits an uninitialized variable vulnerability in the Annotation Objects ActiveX component. The ActiveX component loads into memory without opting into ALSR so this module exploits the vulnerability against windows Vista and Windows 7 targets. A large
CVSS scores for CVE-2012-5896
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2012-5896
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/74448
InTrust ActiveX control (AnnotateX.dll) code execution CVE-2012-5896 Vulnerability Report
-
http://www.exploit-db.com/exploits/18674
Quest InTrust 10.4.x - Annotation Objects ActiveX Control 'AnnotateX.dll' Uninitialized Pointer Remote Code Execution - Windows remote ExploitExploit
-
http://packetstormsecurity.org/files/111312/Quest-InTrust-10.4.x-Annotation-Objects-Code-Execution.html
Quest InTrust 10.4.x Annotation Objects Code Execution ≈ Packet Storm
-
http://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/intrust_annotatex_add.rb
Exploit
-
http://packetstormsecurity.org/files/111853/Quest-InTrust-Annotation-Objects-Uninitialized-Pointer.html
Quest InTrust Annotation Objects Uninitialized Pointer ≈ Packet StormExploit
-
http://archives.neohapsis.com/archives/bugtraq/2012-03/0153.html
Exploit
-
http://www.securityfocus.com/bid/52765
Quest InTrust 'AnnotateX.dll' Uninitialized Pointer Code Execution VulnerabilityExploit
Jump to