CVE-2012-1528

Severity

93%

Complexity

86%

Confidentiality

165%

Per: http://technet.microsoft.com/security/bulletin/MS12-072 "A remote code execution vulnerability exists in the Briefcase feature in Windows. An attacker could exploit the vulnerability by convincing a user to open a specially crafted briefcase.....The vulnerability cannot be exploited automatically through email. For an attack to be successful a user must open an attachment that is sent in an email message."

Integer overflow in Windows Shell in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 allows local users to gain privileges via a crafted briefcase, aka "Windows Briefcase Integer Overflow Vulnerability."

Per: http://technet.microsoft.com/security/bulletin/MS12-072 "A remote code execution vulnerability exists in the Briefcase feature in Windows. An attacker could exploit the vulnerability by convincing a user to open a specially crafted briefcase.....The vulnerability cannot be exploited automatically through email. For an attack to be successful a user must open an attachment that is sent in an email message."

CVSS 2.0 Base Score 9.3. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C).

Overview

Type

Windows

First reported 12 years ago

2012-11-14 00:55:00

Last updated 5 years ago

2019-02-26 14:04:00

Affected Software

Microsoft Windows 7 x64 (64-bit)

Microsoft Windows 7 x86 (32-bit)

Microsoft Windows 7 64-bit Service Pack 1 (initial release)

Microsoft Windows 7 x86 Service Pack 1

Windows 8 x64 (64-bit)

Windows 8 x86 (32-bit)

Microsoft Windows Server 2003 Service Pack 2

Windows Server 2008 R2 for x64-based Systems

Microsoft Windows Server 2008 Service Pack 2 x64 (64-bit)

Windows Server 2008 Service Pack 2 x86

Microsoft Windows Server 2008 R2 Service Pack 1 x64 (64-bit)

r2

Microsoft Windows Server 2012

Microsoft Windows Vista Service Pack 2

Microsoft Windows Vista Service Pack 2 x64 (64-bit)

Microsoft Windows XP Service Pack 3

Microsoft Windows XP Service Pack 2 x64 (64-bit)

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.