Intrusion Prevention

MS.Windows.MSCOMCTL.ActiveX.Control.Remote.Code.Execution

Description

This indicates an attempt to exploit a Code Execution vulnerability in Microsoft Windows.
This vulnerability is caused by an error in the MSCOMCTL ActiveX Control when processing malicious data in a stream. As a result, a remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted DOC or RTF file.

Affected Products

Microsoft Office 2003 Service Pack 3
Microsoft Office 2003 Web Components Service Pack 3
Microsoft Office 2007 Service Pack 2
Microsoft Office 2007 Service Pack 3
Microsoft Office 2010 (32-bit Edition)
Microsoft Office 2010 Service Pack 1 (32-bit Edition)
Microsoft SQL Server 2000 Analysis Services Service Pack 4
Microsoft SQL Server 2000 Service Pack 4
Microsoft SQL Server 2005 Express Edition with Advanced Services Service Pack 4
Microsoft SQL Server 2005 for 32-bit Systems Service Pack 4
Microsoft SQL Server 2005 for Itanium-Based Systems Service Pack 4
Microsoft SQL Server 2005 for x64-based Systems Service Pack 4
Microsoft SQL Server 2008 for 32-bit Systems Service Pack 2
Microsoft SQL Server 2008 for 32-bit Systems Service Pack 3
Microsoft SQL Server 2008 for x64-based Systems Service Pack 2
Microsoft SQL Server 2008 for x64-based Systems Service Pack 3
Microsoft SQL Server 2008 for Itanium-Based Systems Service Pack 2
Microsoft SQL Server 2008 for Itanium-Based Systems Service Pack 3
Microsoft SQL Server 2008 R2 for 32-bit Systems
Microsoft SQL Server 2008 R2 for Itanium-Based Systems
Microsoft SQL Server 2008 R2 for x64-based Systems
Microsoft BizTalk Server
Microsoft BizTalk Server 2002 Service Pack 1
Microsoft Commerce Server 2002 Service Pack 4
Microsoft Commerce Server 2007 Service Pack 2
Microsoft Commerce Server 2009
Microsoft Commerce Server 2009 R2
Microsoft Visual FoxPro 8.0 Service Pack 1
Microsoft Visual FoxPro 9.0 Service Pack 2
Visual Basic 6.0 Runtime

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Refer to the vendor's web site for suggested workaround.
http://technet.microsoft.com/en-us/security/bulletin/ms12-027.mspx

CVE References

CVE-2012-0158