CVE-2012-1537
Published Dec 12, 2012
Last updated 6 years ago
Overview
- Description
- Heap-based buffer overflow in DirectPlay in DirectX 9.0 through 11.1 in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 allows remote attackers to execute arbitrary code via a crafted Office document, aka "DirectPlay Heap Overflow Vulnerability."
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:directx:10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29B9C375-2634-43A8-950D-FD1AD7ED1584" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5494A20A-5927-4249-942C-189292E5F956" }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:directx:11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "998918B6-EB7E-4CD3-8190-58BA6692B3A2" }, { "criteria": "cpe:2.3:a:microsoft:directx:11.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2F34067-00A7-4B00-9A82-4B5891F9345C" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "36559BC0-44D7-48B3-86FF-1BFF0257B5ED" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:directx:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2936E9C2-65E6-4D26-A277-FF2AE13A3FEC" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CE477A73-4EE4-41E9-8694-5A3D5DC88656" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:directx:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A53A6AC-74B0-4DB3-B94D-06FB969AE83C" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C" }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C" } ], "operator": "OR" } ], "operator": "AND" } ]