HTTP: Microsoft Windows Object Packager ClickOnce Object Handling Code Execution

This signature detects attempts to exploit a known vulnerability against Microsoft Windows Object Packager. A successful attack can lead to arbitrary code execution.

Extended Description

Microsoft Windows is prone to a remote code-execution vulnerability. An attacker can exploit this issue by tricking an unsuspecting victim into viewing a malformed file. Successful exploits can allow attackers to execute arbitrary code within the privileges of the user running the affected application. Note: This issue can also be exploited by embedding other file types such as Python ('.py') or '.jar' files, if the correct interpreter is installed on the vulnerable computer.

Affected Products

Avaya messaging_application_server,Microsoft windows_server_2008_r2_datacenter

References

BugTraq: 51284

CVE: CVE-2012-0013

Short Name
HTTP:STC:DL:MS-OBJ-PACKAGER-RCE
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2012-0013 ClickOnce Code Execution Handling Microsoft Object Packager Windows bid:51284
Release Date
01/09/2012
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3726
False Positive
Unknown
Vendors

Microsoft

Avaya

CVSS Score

9.3

Found a potential security threat?