<<  MS12-031: Vulnerability In Microsoft Visio Viewer Could Allow Remote MS12-033: Vulnerability In Windows Partition Manager Could Allow  >>
MS12-032: Vulnerability In TCP/IP Could Allow Elevation of Privilege

MS12-032: Vulnerability In TCP/IP Could Allow Elevation of Privilege (2688338). CVE. CVE. Severity. Severity. Exploitability. Exploitability. Comment. Comment. Note. Note. CVE-2012-0174. Important. N/A. N/A. Security Bypass. Cooperatively Disclosed. CVE-2012-0179. Important. 1. N/A. Elevation of Privilege. Publicly Disclosed. Affected Products. Affected Products. All supported versions of Windows 7, Windows Vista, Windows Server 2008, and Windows Server 2008 R2. All supported versions of Windows 7, Windows Vista, Windows Server 2008, and Windows Server 2008 R2. All supported versions of Windows 7, Windows Vista, Windows Server 2008, and Windows Server 2008 R2. All supported versions of Windows 7, Windows Vista, Windows Server 2008, and Windows Server 2008 R2. Affected Components. Affected Components. Windows Firewall, TCP/IP. Windows Firewall, TCP/IP. Windows Firewall, TCP/IP. Windows Firewall, TCP/IP. Deployment Priority. Deployment Priority. 3. 3. 3. 3. Main Target. Main Target. Workstations and Servers. Workstations and Servers. Workstations and Servers. Workstations and Servers. Possible Attack Vectors. Possible Attack Vectors. CVE-2012-0174: In order to use this vulnerability, an attacker would first have to gain access to the local subnet of the target computer. An attacker could then use another vulnerability to acquire information about the target system or execute code on the target system. CVE-2012-0179: To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take complete control over the affected system. CVE-2012-0174: In order to use this vulnerability, an attacker would first have to gain access to the local subnet of the target computer. An attacker could then use another vulnerability to acquire information about the target system or execute code on the target system. CVE-2012-0179: To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take complete control over the affected system. CVE-2012-0174: In order to use this vulnerability, an attacker would first have to gain access to the local subnet of the target computer. An attacker could then use another vulnerability to acquire information about the target system or execute code on the target system. CVE-2012-0179: To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take complete control over the affected system. CVE-2012-0174: In order to use this vulnerability, an attacker would first have to gain access to the local subnet of the target computer. An attacker could then use another vulnerability to acquire information about the target system or execute code on the target system. CVE-2012-0179: To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take complete control over the affected system. Impact of Attack. Impact of Attack. CVE-2012-0174: An attacker who successfully exploited this vulnerability could bypass Windows Firewall. CVE-2012-0179: An attacker who successfully exploited this vulnerability could run arbitrary code in the context of another process. CVE-2012-0174: An attacker who successfully exploited this vulnerability could bypass Windows Firewall. CVE-2012-0179: An attacker who successfully exploited this vulnerability could run arbitrary code in the context of another process. CVE-2012-0174: An attacker who successfully exploited this vulnerability could bypass Windows Firewall. CVE-2012-0179: An attacker who successfully exploited this vulnerability could run arbitrary code in the context of another process. CVE-2012-0174: An attacker who successfully exploited this vulnerability could bypass Windows Firewall. CVE-2012-0179: An attacker who successfully exploited this vulnerability could run arbitrary code in the context of another process. Mitigating Factors. Mitigating Factors. CVE-2012-0174: An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. CVE-2012-0179: Microsoft has not identified any mitigating factors for this vulnerability. CVE-2012-0174: An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. CVE-2012-0179: Microsoft has not identified any mitigating factors for this vulnerability. CVE-2012-0174: An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. CVE-2012-0179: Microsoft has not identified any mitigating factors for this vulnerability. CVE-2012-0174: An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. CVE-2012-0179: Microsoft has not identified any mitigating factors for this vulnerability. Latest Software. Older Versions.

Слайд 9 из презентации «Information About Microsoft May 2012 Security Bulletins»

Размеры: 720 х 540 пикселей, формат: .jpg. Чтобы бесплатно скачать слайд для использования на уроке, щёлкните на изображении правой кнопкой мышки и нажмите «Сохранить изображение как...». Скачать всю презентацию «Information About Microsoft May 2012 Security Bulletins.pptx» можно в zip-архиве размером 473 КБ.

Похожие презентации

краткое содержание других презентаций на тему слайда

«Технологии Microsoft» - Программа семинара. Требуется новый уровень осмысления проблемы использования технологий в учебном процессе. Направления взаимодействия Microsoft с системой образования. Использование технологий в образовании. Нам важно ваше мнение! Роль Программы «Академия информационных технологий Microsoft» (Microsoft IT Academy).

«Приложения Microsoft» - Exploitability: Насколько легко запустить атаку? Физ.-Мат. Создание безопасных приложений с использованием средств разработки Microsoft. Damage potential: Какова величина ущерба при использовании уязвимости? Типичные методы обеспечения безопасности. Достижения. Аутентификация в .NET. Статические анализаторы кода.

«Microsoft программы» - Microsoft access 2007 (окно программы). Электронная почта – самый распространенный вид сетевой коммуникации. Microsoft access 2003 (окно программы). Программы Microsoft Office. Microsoft outlook express (электронная почта). Основное назначение табличного процессора – автоматизация расчетов. Microsoft outlook express (окно программы).

«Портал Microsoft» - Сертификат X.509. Этап II: Формирование заказа. Web-сервисы / API / MSMQ. Приложение. Единая точка входа для систем управления бизнесом. Microsoft CRM. Проводит кампанию. Ключевая дискета. Композитное приложение. Sales Header. Порталы Microsoft SharePoint. Итоги III этапа. Бизнес-сценарий. Построение графика продаж Добавление клиента в маркетинговую кампанию.

«Майкрософт Украина» - Партнерская сеть в Украине. Корпорация Майкрософт – основные факты. Веб-телефон. Чтение. Microsoft Certified Partners. Направления работы Майкрософт в Украине: развитие сети технической поддержки. Представители Майкрософт. ПК в автомобиле. Дорога с работы. Взаимосвязь компаний. Приоритетные направления работы майкрософт в украине.

«Курсы Microsoft» - Программа «Партнерство в образовании»: Учебные курсы Microsoft для средней школы. Тренинги по учебным курсам серии «Партнерство в образовании». Доступность новых курсов Майкрософт. Лаборатория знаний». Лаборатория знаний". Запись на тренинги. Курс «Персональный компьютер: настройка и техническая поддержка».

Microsoft

6 презентаций о Microsoft
Урок

Информатика

130 тем