ID

VAR-201204-0148


CVE

CVE-2012-0146


TITLE

Microsoft Forefront Unified Access Gateway Open redirect vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2012-002028

DESCRIPTION

Open redirect vulnerability in Microsoft Forefront Unified Access Gateway (UAG) 2010 SP1 and SP1 Update 1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a crafted URL, aka "UAG Blind HTTP Redirect Vulnerability.". Microsoft Forefront Unified Access Gateway is prone to a URI open-redirection vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to spoof a UAG server or redirect legitimate network traffic intended for a UAG server. This may allow the attacker to masquerade as a legitimate server, aiding in further attacks. The solution mainly provides application intelligence technology and fine-grained access control functions. Also known as "UAG Blind HTTP Redirection Vulnerability". ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Microsoft Forefront Unified Access Gateway Two Vulnerabilities SECUNIA ADVISORY ID: SA48787 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48787/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48787 RELEASE DATE: 2012-04-10 DISCUSS ADVISORY: http://secunia.com/advisories/48787/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48787/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48787 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A weakness and a vulnerability have been reported in Microsoft Forefront Unified Access Gateway, which can be exploited by malicious people to conduct spoofing attacks and disclose certain sensitive information. 1) A weakness in UAG allows redirecting users to an untrusted site e.g. spoofing a legitimate UAG Web interface. 2) An error within the default website configuration allows access to certain content from the external network. SOLUTION: Apply patches. Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: MS12-026 (KB2663860, KB2649261, KB2649262): http://technet.microsoft.com/en-us/security/bulletin/ms12-026 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Awareness System Technical Cyber Security Alert TA12-101A Microsoft Updates for Multiple Vulnerabilities Original release date: April 10, 2012 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Internet Explorer * Microsoft .NET Framework * Microsoft Office * Microsoft Server Software * Microsoft SQL Server * Microsoft Developer Tools * Microsoft Forefront United Access Gateway Overview There are multiple vulnerabilities in Microsoft Windows, Internet Explorer, Microsoft .NET Framework, Microsoft Office, Microsoft Server Software, Microsoft SQL Server, Microsoft Developer Tools, and Microsoft Forefront United Access Gateway. Microsoft has released updates to address these vulnerabilities. Description The Microsoft Security Bulletin Summary for April 2012 describes multiple vulnerabilities in Microsoft software. Microsoft has released updates to address the vulnerabilities. Impact A remote, unauthenticated attacker could execute arbitrary code, cause a denial of service, or gain unauthorized access to your files or system. Solution Apply updates Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for April 2012, which describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS). Home users are encouraged to enable automatic updates. References * Microsoft Security Bulletin Summary for April 2012 - <http://technet.microsoft.com/en-us/security/bulletin/ms12-apr> * Microsoft Windows Server Update Services - <http://technet.microsoft.com/en-us/wsus/default.aspx> * Microsoft Update - <https://www.update.microsoft.com/> * Microsoft Update Overview - <http://www.microsoft.com/security/updates/mu.aspx> * Turn Automatic Updating On or Off - <http://windows.microsoft.com/en-us/windows-vista/Turn-automatic-updating-on-or-off> Revision History April 10, 2012: Initial release ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA12-101A Feedback VU#507275" in the subject. ____________________________________________________________________ Produced by US-CERT, a government organization. ____________________________________________________________________ This product is provided subject to the Notification as indicated here: http://www.us-cert.gov/legal.html#notify This document can also be found at http://www.us-cert.gov/cas/techalerts/TA12-101A.html For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBT4R9vT/GkGVXE7GMAQJ9Kwf+KD4RrpgeT6CAAgILeIFesdYAGWvVBkS2 2HvmfVPJzwddWuPq66BHM+gfHHSIQ7l2zySp7U/pmAzAJ4xmsxg0Jog+R4IfOcDG qRUprowI1Uf6hdSZbsQz2Z3KJgcs3DrT7WxgTmbFVk7ezlkFUO1dn+hcAlmWSRzU nKjZBFOswTQqhrOIHit8BxKewt5vD4qwx37Rm2d8QrVaqohf40ih15ArK+VonU4b MB29KEtcNDKoaCRVBiKj1rgiGuLCVhYoz7aPq3ey4zTnFtqkU4zZR4hv+FaUJ4kO 2UCQzfsnMp3JDY+K68E+AchH0PtYOi2T5Dp3gtqdleaxr+tWOdShRg== =Iv8O -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2012-0146 // JVNDB: JVNDB-2012-002028 // BID: 52903 // VULHUB: VHN-53427 // PACKETSTORM: 111723 // PACKETSTORM: 111753

AFFECTED PRODUCTS

vendor:microsoftmodel:forefront unified access gatewayscope:eqversion:2010

Trust: 1.6

vendor:microsoftmodel:forefront unified access gatewayscope:eqversion:2010 sp 1

Trust: 0.8

vendor:microsoftmodel:forefront unified access gatewayscope:eqversion:2010 sp 1 update 1

Trust: 0.8

sources: JVNDB: JVNDB-2012-002028 // CNNVD: CNNVD-201204-119 // NVD: CVE-2012-0146

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0146
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-0146
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201204-119
value: MEDIUM

Trust: 0.6

VULHUB: VHN-53427
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-0146
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-53427
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-53427 // JVNDB: JVNDB-2012-002028 // CNNVD: CNNVD-201204-119 // NVD: CVE-2012-0146

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-53427 // JVNDB: JVNDB-2012-002028 // NVD: CVE-2012-0146

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201204-119

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201204-119

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002028

PATCH

title:MS12-026url:http://technet.microsoft.com/en-us/security/bulletin/ms12-026

Trust: 0.8

title:MS12-026url:http://technet.microsoft.com/ja-jp/security/bulletin/ms12-026

Trust: 0.8

title:TA12-101Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta12-101a.html

Trust: 0.8

sources: JVNDB: JVNDB-2012-002028

EXTERNAL IDS

db:NVDid:CVE-2012-0146

Trust: 2.8

db:SECUNIAid:48787

Trust: 1.8

db:BIDid:52903

Trust: 1.4

db:SECTRACKid:1026909

Trust: 1.1

db:OSVDBid:81131

Trust: 1.1

db:USCERTid:TA12-101A

Trust: 0.9

db:JVNDBid:JVNDB-2012-002028

Trust: 0.8

db:CNNVDid:CNNVD-201204-119

Trust: 0.7

db:MSid:MS12-026

Trust: 0.6

db:NSFOCUSid:19326

Trust: 0.6

db:VULHUBid:VHN-53427

Trust: 0.1

db:PACKETSTORMid:111723

Trust: 0.1

db:PACKETSTORMid:111753

Trust: 0.1

sources: VULHUB: VHN-53427 // BID: 52903 // JVNDB: JVNDB-2012-002028 // PACKETSTORM: 111723 // PACKETSTORM: 111753 // CNNVD: CNNVD-201204-119 // NVD: CVE-2012-0146

REFERENCES

url:http://secunia.com/advisories/48787

Trust: 1.7

url:http://www.securityfocus.com/bid/52903

Trust: 1.1

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-026

Trust: 1.1

url:http://osvdb.org/81131

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a15476

Trust: 1.1

url:http://www.securitytracker.com/id?1026909

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/74367

Trust: 1.1

url:http://www.us-cert.gov/cas/techalerts/ta12-101a.html

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0146

Trust: 0.8

url:http://www.jpcert.or.jp/at/2012/at120012.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta12-101a

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0146

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/#topics

Trust: 0.8

url:http://technet.microsoft.com/security/bulletin/ms12-026

Trust: 0.6

url:http://www.nsfocus.net/vulndb/19326

Trust: 0.6

url:http://technet.microsoft.com/en-us/security/bulletin/ms12-026

Trust: 0.4

url:http://www.microsoft.com

Trust: 0.3

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48787

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/48787/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/48787/#comments

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://www.us-cert.gov/legal.html#notify

Trust: 0.1

url:http://windows.microsoft.com/en-us/windows-vista/turn-automatic-updating-on-or-off>

Trust: 0.1

url:http://technet.microsoft.com/en-us/security/bulletin/ms12-apr>

Trust: 0.1

url:https://www.update.microsoft.com/>

Trust: 0.1

url:http://www.microsoft.com/security/updates/mu.aspx>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html

Trust: 0.1

url:http://technet.microsoft.com/en-us/wsus/default.aspx>

Trust: 0.1

sources: VULHUB: VHN-53427 // BID: 52903 // JVNDB: JVNDB-2012-002028 // PACKETSTORM: 111723 // PACKETSTORM: 111753 // CNNVD: CNNVD-201204-119 // NVD: CVE-2012-0146

CREDITS

Microsoft

Trust: 0.3

sources: BID: 52903

SOURCES

db:VULHUBid:VHN-53427
db:BIDid:52903
db:JVNDBid:JVNDB-2012-002028
db:PACKETSTORMid:111723
db:PACKETSTORMid:111753
db:CNNVDid:CNNVD-201204-119
db:NVDid:CVE-2012-0146

LAST UPDATE DATE

2025-04-11T20:59:39.164000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-53427date:2018-10-12T00:00:00
db:BIDid:52903date:2012-04-10T00:00:00
db:JVNDBid:JVNDB-2012-002028date:2012-04-16T00:00:00
db:CNNVDid:CNNVD-201204-119date:2012-04-11T00:00:00
db:NVDid:CVE-2012-0146date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-53427date:2012-04-10T00:00:00
db:BIDid:52903date:2012-04-10T00:00:00
db:JVNDBid:JVNDB-2012-002028date:2012-04-12T00:00:00
db:PACKETSTORMid:111723date:2012-04-11T06:18:00
db:PACKETSTORMid:111753date:2012-04-11T15:07:01
db:CNNVDid:CNNVD-201204-119date:2012-04-11T00:00:00
db:NVDid:CVE-2012-0146date:2012-04-10T21:55:01.407