MS12-058 - Vulnerability in Microsoft Exchange Server WebReady Document Viewing Could Allow Remote Code Execution (2740358)

Click any highlighted term for further explanation. For more information, contact technical support.

 

Details
Vulnerability name/brief description MS12-058 - Vulnerability in Microsoft Exchange Server WebReady Document Viewing Could Allow Remote Code Execution (2740358)
CVE/CAN name
Vendor threat level Critical
SophosLabs threat level High
Solution MS12-058
Vendor description This security update resolves a publicly disclosed vulnerability in Microsoft Exchange Server WebReady Document Viewing. The vulnerability could allow remote code execution in the security context of the transcoding service on the Exchange server if a user previews a specially crafted file using Outlook Web App (OWA). The transcoding service in Exchange that is used for WebReady Document Viewing is running in the LocalService account. The LocalService account has minimum privileges on the local computer and presents anonymous credentials on the network.
SophosLabs comments This vulnerability exists due to the way the WebReady service parses files using the Oracle Outside In libraries in order to provide a preview of the document in the browser. As an attacker who successfully exploited this vulnerability could only run arbitrary code as LocalService, its effect on the network is limited to privileges on the local computer although it may allow the creation of anonymous credentials on the network. In spite of this, Sophos expects the impact of this vulnerability to be mitigated.
SophosLabs testing result No SophosLabs testing result found
Currently known exploits No currently known exploits found
First sample seen No samples found
Discovery date 14 Aug 2012
Affected software Microsoft Exchange Server 2007 Service Pack 3 with WebReady Document Viewing
Microsoft Exchange Server 2010 Service Pack 1 with WebReady Document Viewing
Microsoft Exchange Server 2010 Service Pack 2 with WebReady Document Viewing
References
Credits
  • MAPP
Revisions
  • August 14, 2012 - Initial analysis written

Explanation of terms

Vulnerability Name/Brief Description:

Vendor identifier plus a brief description of the type of attack.

CVE/CAN Name:

Currently assigned CVE name. If a CVE name doesn't exist the CAN name will be used until a CVE has been assigned.

Vendor Threat Level:

Threat level assigned by the vendor

SophosLabs Threat Level:

Threat level assigned by SophosLabs

  • LOW RISK - There is little chance of this vulnerability being actively exploited by malware.
  • MEDIUM RISK - There is a possibility of this vulnerability being actively exploited by malware.
  • HIGH RISK - There is a strong possibility of this vulnerability being actively exploited by malware.
  • CRITICAL RISK - This vulnerability will almost certainly be actively exploited by malware.

Solution:

Vendor-supplied Patch identifier and recommended solution, or workaround if applicable.

Vendor Description:

Summary of the cause and potential effect of the vulnerability provided by the vendor.

SophosLabs Comments:

SophosLabs' opinions and observations of the vulnerability in question.

SophosLabs Testing Result:

Details of completed lab testing, if applicable. Please note that the lab test environment may differ significantly from user environments.

Currently Known Exploits:

List of identities for known exploits, if applicable.

First Sample Seen:

Date of the first sample seen by SophosLabs.

Discovery Date:

Date of the earliest known publically disclosed advisory.

Affected Software:

Vulnerable platforms and software versions.