CVE-2012-0002

Microsoft Windows 7 - Code Injection

Title source: rule

Description

The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly process packets in memory, which allows remote attackers to execute arbitrary code by sending crafted RDP packets triggering access to an object that (1) was not properly initialized or (2) is deleted, aka "Remote Desktop Protocol Vulnerability."

Exploits (4)

exploitdb WORKING POC VERIFIED
by Luigi Auriemma · textdoswindows
https://www.exploit-db.com/exploits/18606
nomisec SCANNER
by zhangkaibin0921 · poc
https://github.com/zhangkaibin0921/MS12-020-CVE-2012-0002
metasploit WORKING POC
by Luigi Auriemma, Daniel Godas-Lopez, s pastie, ,, , · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/windows/rdp/ms12_020_maxchannelids.rb
metasploit SCANNER
by Royce Davis · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/rdp/ms12_020_check.rb

Scores

EPSS 0.8738
EPSS Percentile 99.5%

Details

CWE
CWE-94
Status published
Products (6)
microsoft/windows_7 (4 CPE variants)
microsoft/windows_server_2003
microsoft/windows_server_2008 (3 CPE variants)
microsoft/windows_server_2008 r2 (2 CPE variants)
microsoft/windows_vista
microsoft/windows_xp (2 CPE variants)
Published Mar 13, 2012
Tracked Since Feb 18, 2026