C

CVE-2012-1889

Microsoft – Freeware – Windows
This is a fix for Microsoft Security Advisory (2719615):

Microsoft is aware of active attacks that leverage a vulnerability in Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The vulnerability affects all supported releases of Microsoft Windows, and all supported editions of Microsoft Office 2003 and Microsoft Office 2007.

The vulnerability exists when MSXML attempts to access an object in memory that has not been initialized, which may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user.

Overview

CVE-2012-1889 is a Freeware software in the category System Utilities developed by Microsoft.

The latest version of CVE-2012-1889 is currently unknown. It was initially added to our database on 06/25/2012.

CVE-2012-1889 runs on the following operating systems: Windows.

CVE-2012-1889 has not been rated by our users yet.

Pros

  • Microsoft takes security vulnerabilities seriously and regularly releases patches and updates to address them.

Cons

  • CVE-2012-1889 is a specific security vulnerability that affects Microsoft software, indicating a potential weakness in their products.
  • It may require users to manually download and install the necessary patch or update to protect against this particular vulnerability.

FAQ

What is CVE-2012-1889?

CVE-2012-1889 is a vulnerability in Internet Explorer (IE) that allows remote attackers to execute arbitrary code or cause a denial of service (DoS) attack via a crafted web page.

Which versions of Internet Explorer (IE) are affected by CVE-2012-1889?

CVE-2012-1889 affects all versions of IE, from IE6 to IE9, on Windows XP, Vista, and 7.

How can I protect myself from CVE-2012-1889?

You can protect yourself by installing the security update provided by Microsoft. Additionally, you can use a different web browser, such as Google Chrome or Mozilla Firefox, until the security update is installed.

How does CVE-2012-1889 work?

CVE-2012-1889 works by exploiting a use-after-free vulnerability in IE's handling of certain objects in memory. Attackers can create a specially-crafted web page that triggers this vulnerability and allows them to execute arbitrary code or cause a DoS attack.

Has Microsoft released a security update for CVE-2012-1889?

Yes, Microsoft released a security update for CVE-2012-1889 on June 12, 2012 as part of its monthly Patch Tuesday updates.

What should I do if I think my computer has been attacked using CVE-2012-1889?

You should run a full scan of your computer using an up-to-date antivirus software and anti-malware software. You should also install the security update provided by Microsoft and ensure that your web browser is up-to-date.

Are there any known exploits in the wild for CVE-2012-1889?

Yes, there were known exploits in the wild for CVE-2012-1889 before Microsoft released the security update. This vulnerability was actively exploited by the Poison Ivy Trojan, among others.

What is the severity rating of CVE-2012-1889?

CVE-2012-1889 has a base score of 9.3 out of 10 on the Common Vulnerability Scoring System (CVSS), indicating a high severity level.

What is the Common Vulnerability Scoring System (CVSS)?

The Common Vulnerability Scoring System (CVSS) is a standardized system used to assess and communicate the severity of vulnerabilities in software systems.

What should I do if I am unable to install the security update provided by Microsoft?

If you are unable to install the security update provided by Microsoft, you can consider using Microsoft's Enhanced Mitigation Experience Toolkit (EMET) to provide additional protection against CVE-2012-1889. However, you should still try to install the security update as soon as possible.

Download not yet available. Please add one.

Stay up-to-date
with UpdateStar freeware.

Latest Reviews

N Novicorp WinToFlash Lite verze
Create Bootable USB Drives with Ease: Novicorp WinToFlash Lite
I iFormScan
iFormScan: Streamlining Data Capture Effortlessly
Papyrus-PlugIn-web Papyrus-PlugIn-web
Streamline Document Management with Papyrus-PlugIn-web
N NetCrunch WMI Tool
Streamline Your WMI Management with NetCrunch WMI Tool
Bloons Adventure Time TD Bloons Adventure Time TD
Pop Your Way Through Adventure in Bloons Adventure Time TD!
G Grand Master Chess OnLine
Master Your Moves with Grand Master Chess OnLine!
UpdateStar Premium Edition UpdateStar Premium Edition
Keeping Your Software Updated Has Never Been Easier with UpdateStar Premium Edition!
Microsoft Visual C++ 2015 Redistributable Package Microsoft Visual C++ 2015 Redistributable Package
Boost your system performance with Microsoft Visual C++ 2015 Redistributable Package!
Microsoft Edge Microsoft Edge
A New Standard in Web Browsing
Google Chrome Google Chrome
Fast and Versatile Web Browser
Microsoft Visual C++ 2010 Redistributable Microsoft Visual C++ 2010 Redistributable
Essential Component for Running Visual C++ Applications
Microsoft Update Health Tools Microsoft Update Health Tools
Microsoft Update Health Tools: Ensure Your System is Always Up-to-Date!

Latest Updates


Money Note with FingerID 2.8

This application offers a streamlined solution for managing and calculating income and expenditure within personal accounts. It incorporates security features to protect your sensitive and private data through password encryption.

ThinFaced Thin Face Photo FX 2.3.0

ThinFaced is an application that allows users to simulate a thinner appearance using their iPhone or iPad cameras. It provides real-time facial transformations aimed at visualizing a slimmer face profile.

SpottyFaced Spotty Face Maker 2.2.9

SpottyFaced offers a lighthearted and interactive way to alter your photos by adding digital "spots" using your iPhone or iPad. The application allows users to transform their images into humorous, spotty appearances with ease.

Lloyd Flanders 2.2.16

High-quality furniture transcends mere decoration; it is thoughtfully crafted to complement the meaningful moments in our lives. It is created for laughter and family gatherings, for romance and introspection, for rest and recreation.

Halloween Candy Drop Pachinko 1.4

Halloween Candy Drop presents a festive Halloween-themed experience that combines simple mechanics with engaging challenges. In this game, players drop candies down a pegboard, aiming to achieve the highest possible score.

Old Colorado City 3.1

The Old Colorado City touring app serves as a comprehensive resource for exploring the area's rich history. It features a GPS-enabled tour with 14 points of interest, each accompanied by detailed historical facts and photographs, curated …