{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2012-07-10T00:00:00.000Z","descriptions":[{"lang":"en","value":"Heap-based buffer overflow in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2 and Windows Data Access Components (WDAC) 6.0 allows remote attackers to execute arbitrary code via crafted XML data that triggers access to an uninitialized object in memory, aka \"ADO Cachesize Heap Overflow RCE Vulnerability.\""}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-12T19:57:01.000Z","orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft"},"references":[{"name":"TA12-192A","tags":["third-party-advisory","x_refsource_CERT"],"url":"http://www.us-cert.gov/cas/techalerts/TA12-192A.html"},{"name":"MS12-045","tags":["vendor-advisory","x_refsource_MS"],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-045"},{"name":"oval:org.mitre.oval:def:14783","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14783"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secure@microsoft.com","ID":"CVE-2012-1891","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Heap-based buffer overflow in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2 and Windows Data Access Components (WDAC) 6.0 allows remote attackers to execute arbitrary code via crafted XML data that triggers access to an uninitialized object in memory, aka \"ADO Cachesize Heap Overflow RCE Vulnerability.\""}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"TA12-192A","refsource":"CERT","url":"http://www.us-cert.gov/cas/techalerts/TA12-192A.html"},{"name":"MS12-045","refsource":"MS","url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-045"},{"name":"oval:org.mitre.oval:def:14783","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14783"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T19:17:26.954Z"},"title":"CVE Program Container","references":[{"name":"TA12-192A","tags":["third-party-advisory","x_refsource_CERT","x_transferred"],"url":"http://www.us-cert.gov/cas/techalerts/TA12-192A.html"},{"name":"MS12-045","tags":["vendor-advisory","x_refsource_MS","x_transferred"],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-045"},{"name":"oval:org.mitre.oval:def:14783","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14783"}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-908","lang":"en","description":"CWE-908 Use of Uninitialized Resource"}]}],"affected":[{"vendor":"microsoft","product":"data_access_components","cpes":["cpe:2.3:a:microsoft:data_access_components:2.8:sp1:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"2.8","status":"affected"}]},{"vendor":"microsoft","product":"data_access_components","cpes":["cpe:2.3:a:microsoft:data_access_components:2.8:sp2:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"2.8","status":"affected"}]},{"vendor":"microsoft","product":"windows_data_access_components","cpes":["cpe:2.3:a:microsoft:windows_data_access_components:6.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"6.0","status":"affected"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.8,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-10-17T18:26:20.341142Z","id":"CVE-2012-1891","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-17T18:28:20.800Z"}}]},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2012-1891","datePublished":"2012-07-10T21:00:00.000Z","dateReserved":"2012-03-22T00:00:00.000Z","dateUpdated":"2024-10-17T18:28:20.800Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}