Windows file handling component vulnerability could allow remote code execution
Report ID: MS201212005
Date Published: 12 December 2012
Compromise Type: remote-code-execution
Compromise From: remote
Windows Server 2003
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
A vulnerability in a Windows file handling component could allow an attacker to execute arbitrary code on an affected system.
Microsoft has released a security update to address a remote code execution vulnerability found in a file handling component. The vulnerability may cause a memory corruption condition that could be further exploited to enable code execution on an affected system.
The issue has been resolved in the latest update by modifying the way that Windows handles files with specially crafted names. As a security measure, users are recommended to install the update onto their system to protect from possible exploit attempts.
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms12-081)
F-Secure Health Check
F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.