CVE-2012-1889
critical-risk
Published 2012-06-13
Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
Do I need to act?
!
93.1% chance of exploitation in next 30 days
EPSS score — higher than 7% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (4)
Affected Vendors
References (11)
Vendor Advisory
http://technet.microsoft.com/security/advisory/2719615
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA12-174A.html
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA12-192A.html
Vendor Advisory
http://technet.microsoft.com/security/advisory/2719615
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA12-174A.html
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA12-192A.html
74
/ 100
critical-risk
Severity
30/34 · Critical
Exploitability
34/34 · Critical
Exposure
10/34 · Low