CERT-In Vulnerability Note
CIVN-2012-0118
Remote Code Execution Vulnerability in Microsoft Windows DirectPlay
Original Issue Date:December 12, 2012
Severity Rating: HIGH
Systems Affected
- Windows XP SP3
- Windows XP Professional x64 Edition SP 2
- Windows Server 2003 SP 2
- Windows Server 2003 x64 Edition SP 2
- Windows Server 2003 with SP2 for Itanium-based Systems
- Windows Vista SP 2
- Windows Vista x64 Edition SP 2
- Windows Server 2008 for 32-bit Systems SP 2
- Windows Server 2008 for x64-based Systems SP 2
- Windows Server 2008 for Itanium-based Systems SP 2
- Windows 7 for 32-bit Systems and SP1
- Windows 7 for x64-based Systems and SP1
- Windows Server 2008 R2 for x64-based Systems and SP1
- Windows Server 2008 R2 for Itanium-based Systems and SP1
- Windows 8 for 32-bit & 64-bit Systems
- Windows Server 2012
Component Affected
- DirectX 9.0 when running on
Windows XP SP3 Windows XP Professional x64 Edition SP2 - DirectX 10.0 when running on
Windows Server 2003 SP2 Windows Server 2003 SP2 for Itanium-based Systems Windows Server 2008 for Itanium-based Systems SP2.0 Windows Vista SP2 Windows Vista x64 Edition SP2 Windows Server 2008 (32-bit, 64-bit and Itanium) Systems SP2 - DirectX 11.0 when running on
Windows 7 (32-bit and 64-bit)Systems SP1 and prior Windows Server 2008 R2 (x64-bit and Itanium) SP1 - DirectX 11.1 when running on
Windows 8 (32-bit and 64-bit) Systems Windows Server 2012
Overview
A vulnerability has been reported in Microsoft Windows DirectPlay which could be exploited by a remote attacker to take complete control of the affected system in the context of logged in user.
Description
The vulnerability occurs when Windows DirectPlay fails to properly handle specially crafted office documents which could then be exploited to cause a heap-based buffer overflow. An attacker could exploit the vulnerability by sending a specially crafted Office document with embedded content to the user and convincing the user to open the file.
Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code with the gained privileges of affected system
Workaround
- Use Microsoft Office File Block policy to block the opening of Word 2003 and earlier documents from unknown or untrusted sources and locations.
- Use Microsoft Office File Block policy to block the opening of RTF documents from unknown or untrusted sources and locations.
- Prevent ActiveX controls from running in Office 2007 and Office 2010.
- Do not open Office files received from untrusted sources or received unexpectedly from trusted sources.
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
MS12-082
Vendor Information
Microsoft
http://technet.microsoft.com/en-us/security/bulletin/MS12-082
References
Microsoft
http://technet.microsoft.com/en-us/security/bulletin/MS12-082
SecurityTracker
http://www.securitytracker.com/id/1027859
Secunia
http://secunia.com/advisories/51497/
CVE Name
CVE-2012-1537
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|