ID

VAR-201211-0024


CVE

CVE-2012-2532


TITLE

Microsoft FTP Service for IIS Vulnerability in which important information is obtained

Trust: 0.8

sources: JVNDB: JVNDB-2012-005347

DESCRIPTION

Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) processes unspecified commands before TLS is enabled for a session, which allows remote attackers to obtain sensitive information by reading the replies to these commands, aka "FTP Command Injection Vulnerability.". Microsoft IIS is prone to a remote command-injection vulnerability because it fails to adequately sanitize user-supplied input data. Remote attackers can exploit this issue to execute arbitrary commands with the privileges of the application; this may disclose sensitive information. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Awareness System US-CERT Alert TA12-318A Microsoft Updates for Multiple Vulnerabilities Original release date: November 13, 2012 Last revised: -- Systems Affected * Microsoft Windows * Microsoft Office * Microsoft .NET Framework * Internet Explorer Overview Select Microsoft software products contain multiple vulnerabilities. Microsoft has released updates to address these vulnerabilities. Description The Microsoft Security Bulletin Summary for November 2012 describes multiple vulnerabilities in Microsoft software. Microsoft has released updates to address the vulnerabilities. Impact A remote, unauthenticated attacker could execute arbitrary code, cause a denial of service, or gain unauthorized access to your files or system. Solution Apply Updates Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for November 2012, which describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS). Home users are encouraged to enable automatic updates. References * Microsoft Security Bulletin Summary for November 2012 <http://technet.microsoft.com/en-us/security/bulletin/ms12-nov> * Microsoft Windows Server Update Services <http://technet.microsoft.com/en-us/wsus/default.aspx> * Microsoft Update <http://www.update.microsoft.com/> * Microsoft Update Overview <http://www.microsoft.com/security/updates/mu.aspx> * Turn Automatic Updating On or Off <http://windows.microsoft.com/en-us/windows-vista/Turn-automatic-updating-on-or-off> Revision History November 13, 2012: Initial release ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA12-318A Feedback VU#970852" in the subject. ____________________________________________________________________ Produced by US-CERT, a government organization. ____________________________________________________________________ This product is provided subject to this Notification: http://www.us-cert.gov/privacy/notification.html Privacy & Use policy: http://www.us-cert.gov/privacy/ This document can also be found at http://www.us-cert.gov/cas/techalerts/TA12-318A.html For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBUKKbnXdnhE8Qi3ZhAQLN4gf+KyOiTaktnc1wbWdbBogH12NJbOR5Y7PR DRpdn+3Iqyua02oxy2bXy3C/uV1xz2FlRylXS7PRNdka8RboUUOP3jY4DADR2UW/ GCtxskzWydk+w8OT8OvGiwD5TPaUXb/OawDEN5HW2R/Q+vZAcnGvOeuWbvCjM1hB tPUsQLM8QEXQ0oIPelTVBGlBKAXaYdkekTJcpx5sJC1qUn+976hFsajHugBOk06U lEhvTK7eiMpQOeQ0RYeMd8V4cP6h+WYTjxzruckfP4HwMeJARuq6UnTDzZ8mKYws sqs4xqaTr+8eOnoM7G1/7MMDhS2epvbbt7J/MXFp6tc0nVaLnskIQA== =/QVO -----END PGP SIGNATURE-----

Trust: 1.98

sources: NVD: CVE-2012-2532 // JVNDB: JVNDB-2012-005347 // BID: 56440 // PACKETSTORM: 118116

AFFECTED PRODUCTS

vendor:microsoftmodel:ftp servicescope:eqversion:7.5

Trust: 1.6

vendor:microsoftmodel:ftp servicescope:eqversion:7.0

Trust: 1.6

vendor:microsoftmodel:ftp servicescope:eqversion:7.0 for iis 7.0

Trust: 0.8

vendor:microsoftmodel:ftp servicescope:eqversion:7.5 for iis 7.0

Trust: 0.8

vendor:microsoftmodel:ftp servicescope:eqversion:7.5 for iis 7.5

Trust: 0.8

vendor:microsoftmodel:windows 7scope:eqversion:(x32) sp1 before

Trust: 0.8

vendor:microsoftmodel:windows 7scope:eqversion:(x64) sp1 before

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:(x64) sp2

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:(x86) sp2

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:r2(itanium) sp2

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:r2(x64) sp2

Trust: 0.8

vendor:microsoftmodel:windows vistascope:eqversion:(x64) sp2

Trust: 0.8

vendor:microsoftmodel:windows vistascope:eqversion:sp2

Trust: 0.8

vendor:microsoftmodel:internet information serverscope:eqversion:7.5

Trust: 0.6

vendor:microsoftmodel:windows vista service packscope:eqversion:20

Trust: 0.3

vendor:microsoftmodel:windows server r2 itanium sp1scope:eqversion:2008

Trust: 0.3

vendor:microsoftmodel:windows server r2 itaniumscope:eqversion:20080

Trust: 0.3

vendor:microsoftmodel:windows server r2 for x64-based systems sp1scope:eqversion:2008

Trust: 0.3

vendor:microsoftmodel:windows server r2 for x64-based systemsscope:eqversion:20080

Trust: 0.3

vendor:microsoftmodel:windows server for x64-based systems sp2scope:eqversion:2008

Trust: 0.3

vendor:microsoftmodel:windows server for 32-bit systems sp2scope:eqversion:2008

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systems sp1scope:eqversion:7

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systemsscope:eqversion:70

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systems sp1scope:eqversion:7

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systemsscope:eqversion:70

Trust: 0.3

vendor:microsoftmodel:iisscope:eqversion:7.5

Trust: 0.3

vendor:microsoftmodel:iisscope:eqversion:7.0

Trust: 0.3

sources: BID: 56440 // JVNDB: JVNDB-2012-005347 // CNNVD: CNNVD-201211-230 // NVD: CVE-2012-2532

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-2532
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-2532
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201211-230
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2012-2532
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2012-005347 // CNNVD: CNNVD-201211-230 // NVD: CVE-2012-2532

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.8

sources: JVNDB: JVNDB-2012-005347 // NVD: CVE-2012-2532

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201211-230

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201211-230

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-005347

PATCH

title:MS12-073url:http://technet.microsoft.com/en-us/security/bulletin/ms12-073

Trust: 0.8

title:MS12-073url:http://technet.microsoft.com/ja-jp/security/bulletin/ms12-073

Trust: 0.8

title:TA12-318Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta12-318a.html

Trust: 0.8

title:Microsoft FTP Service Fixes for command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=140796

Trust: 0.6

sources: JVNDB: JVNDB-2012-005347 // CNNVD: CNNVD-201211-230

EXTERNAL IDS

db:NVDid:CVE-2012-2532

Trust: 2.7

db:BIDid:56440

Trust: 1.9

db:USCERTid:TA12-318A

Trust: 0.9

db:JVNDBid:JVNDB-2012-005347

Trust: 0.8

db:CNNVDid:CNNVD-201211-230

Trust: 0.6

db:PACKETSTORMid:118116

Trust: 0.1

sources: BID: 56440 // JVNDB: JVNDB-2012-005347 // PACKETSTORM: 118116 // CNNVD: CNNVD-201211-230 // NVD: CVE-2012-2532

REFERENCES

url:http://www.securityfocus.com/bid/56440

Trust: 1.6

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-073

Trust: 1.6

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a15786

Trust: 1.6

url:http://www.us-cert.gov/cas/techalerts/ta12-318a.html

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2532

Trust: 0.8

url:http://www.jpcert.or.jp/at/2012/at120035.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta12-318a

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2532

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/#topics

Trust: 0.8

url:http://www.microsoft.com/windowsserver2003/iis/default.mspx

Trust: 0.3

url:http://www.us-cert.gov/privacy/notification.html

Trust: 0.1

url:http://www.us-cert.gov/privacy/

Trust: 0.1

url:http://windows.microsoft.com/en-us/windows-vista/turn-automatic-updating-on-or-off>

Trust: 0.1

url:http://www.update.microsoft.com/>

Trust: 0.1

url:http://www.microsoft.com/security/updates/mu.aspx>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html

Trust: 0.1

url:http://technet.microsoft.com/en-us/wsus/default.aspx>

Trust: 0.1

url:http://technet.microsoft.com/en-us/security/bulletin/ms12-nov>

Trust: 0.1

sources: BID: 56440 // JVNDB: JVNDB-2012-005347 // PACKETSTORM: 118116 // CNNVD: CNNVD-201211-230 // NVD: CVE-2012-2532

CREDITS

Microsoft

Trust: 0.3

sources: BID: 56440

SOURCES

db:BIDid:56440
db:JVNDBid:JVNDB-2012-005347
db:PACKETSTORMid:118116
db:CNNVDid:CNNVD-201211-230
db:NVDid:CVE-2012-2532

LAST UPDATE DATE

2024-11-23T21:45:53.616000+00:00


SOURCES UPDATE DATE

db:BIDid:56440date:2012-11-20T12:10:00
db:JVNDBid:JVNDB-2012-005347date:2012-11-16T00:00:00
db:CNNVDid:CNNVD-201211-230date:2021-02-07T00:00:00
db:NVDid:CVE-2012-2532date:2024-11-21T01:39:12.037

SOURCES RELEASE DATE

db:BIDid:56440date:2012-11-13T00:00:00
db:JVNDBid:JVNDB-2012-005347date:2012-11-15T00:00:00
db:PACKETSTORMid:118116date:2012-11-15T02:44:59
db:CNNVDid:CNNVD-201211-230date:2012-11-14T00:00:00
db:NVDid:CVE-2012-2532date:2012-11-14T00:55:01.577