ID

VAR-201204-0149


CVE

CVE-2012-0147


TITLE

Microsoft Forefront Unified Access Gateway Vulnerability in which important information is obtained

Trust: 0.8

sources: JVNDB: JVNDB-2012-002029

DESCRIPTION

Microsoft Forefront Unified Access Gateway (UAG) 2010 SP1 and SP1 Update 1 does not properly configure the default web site, which allows remote attackers to obtain sensitive information via a crafted HTTPS request, aka "Unfiltered Access to UAG Default Website Vulnerability.". Microsoft Forefront Unified Access Gateway is prone to a remote information-disclosure vulnerability. Attackers can exploit this issue to gain access to sensitive information that may aid in further attacks. The solution mainly provides application intelligence technology and fine-grained access control functions. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Microsoft Forefront Unified Access Gateway Two Vulnerabilities SECUNIA ADVISORY ID: SA48787 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48787/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48787 RELEASE DATE: 2012-04-10 DISCUSS ADVISORY: http://secunia.com/advisories/48787/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48787/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48787 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A weakness and a vulnerability have been reported in Microsoft Forefront Unified Access Gateway, which can be exploited by malicious people to conduct spoofing attacks and disclose certain sensitive information. 1) A weakness in UAG allows redirecting users to an untrusted site e.g. spoofing a legitimate UAG Web interface. 2) An error within the default website configuration allows access to certain content from the external network. SOLUTION: Apply patches. Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: MS12-026 (KB2663860, KB2649261, KB2649262): http://technet.microsoft.com/en-us/security/bulletin/ms12-026 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Awareness System Technical Cyber Security Alert TA12-101A Microsoft Updates for Multiple Vulnerabilities Original release date: April 10, 2012 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Internet Explorer * Microsoft .NET Framework * Microsoft Office * Microsoft Server Software * Microsoft SQL Server * Microsoft Developer Tools * Microsoft Forefront United Access Gateway Overview There are multiple vulnerabilities in Microsoft Windows, Internet Explorer, Microsoft .NET Framework, Microsoft Office, Microsoft Server Software, Microsoft SQL Server, Microsoft Developer Tools, and Microsoft Forefront United Access Gateway. Microsoft has released updates to address these vulnerabilities. Description The Microsoft Security Bulletin Summary for April 2012 describes multiple vulnerabilities in Microsoft software. Microsoft has released updates to address the vulnerabilities. Impact A remote, unauthenticated attacker could execute arbitrary code, cause a denial of service, or gain unauthorized access to your files or system. Solution Apply updates Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for April 2012, which describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS). Home users are encouraged to enable automatic updates. References * Microsoft Security Bulletin Summary for April 2012 - <http://technet.microsoft.com/en-us/security/bulletin/ms12-apr> * Microsoft Windows Server Update Services - <http://technet.microsoft.com/en-us/wsus/default.aspx> * Microsoft Update - <https://www.update.microsoft.com/> * Microsoft Update Overview - <http://www.microsoft.com/security/updates/mu.aspx> * Turn Automatic Updating On or Off - <http://windows.microsoft.com/en-us/windows-vista/Turn-automatic-updating-on-or-off> Revision History April 10, 2012: Initial release ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA12-101A Feedback VU#507275" in the subject. ____________________________________________________________________ Produced by US-CERT, a government organization. ____________________________________________________________________ This product is provided subject to the Notification as indicated here: http://www.us-cert.gov/legal.html#notify This document can also be found at http://www.us-cert.gov/cas/techalerts/TA12-101A.html For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBT4R9vT/GkGVXE7GMAQJ9Kwf+KD4RrpgeT6CAAgILeIFesdYAGWvVBkS2 2HvmfVPJzwddWuPq66BHM+gfHHSIQ7l2zySp7U/pmAzAJ4xmsxg0Jog+R4IfOcDG qRUprowI1Uf6hdSZbsQz2Z3KJgcs3DrT7WxgTmbFVk7ezlkFUO1dn+hcAlmWSRzU nKjZBFOswTQqhrOIHit8BxKewt5vD4qwx37Rm2d8QrVaqohf40ih15ArK+VonU4b MB29KEtcNDKoaCRVBiKj1rgiGuLCVhYoz7aPq3ey4zTnFtqkU4zZR4hv+FaUJ4kO 2UCQzfsnMp3JDY+K68E+AchH0PtYOi2T5Dp3gtqdleaxr+tWOdShRg== =Iv8O -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2012-0147 // JVNDB: JVNDB-2012-002029 // BID: 52909 // VULHUB: VHN-53428 // PACKETSTORM: 111723 // PACKETSTORM: 111753

AFFECTED PRODUCTS

vendor:microsoftmodel:forefront unified access gatewayscope:eqversion:2010

Trust: 1.6

vendor:microsoftmodel:forefront unified access gatewayscope:eqversion:2010 sp 1

Trust: 0.8

vendor:microsoftmodel:forefront unified access gatewayscope:eqversion:2010 sp 1 update 1

Trust: 0.8

sources: JVNDB: JVNDB-2012-002029 // CNNVD: CNNVD-201204-120 // NVD: CVE-2012-0147

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0147
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-0147
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201204-120
value: MEDIUM

Trust: 0.6

VULHUB: VHN-53428
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-0147
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-53428
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-53428 // JVNDB: JVNDB-2012-002029 // CNNVD: CNNVD-201204-120 // NVD: CVE-2012-0147

PROBLEMTYPE DATA

problemtype:CWE-16

Trust: 1.9

sources: VULHUB: VHN-53428 // JVNDB: JVNDB-2012-002029 // NVD: CVE-2012-0147

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201204-120

TYPE

configuration error

Trust: 0.6

sources: CNNVD: CNNVD-201204-120

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002029

PATCH

title:MS12-026url:http://technet.microsoft.com/en-us/security/bulletin/ms12-026

Trust: 0.8

title:MS12-026url:http://technet.microsoft.com/ja-jp/security/bulletin/ms12-026

Trust: 0.8

title:TA12-101Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta12-101a.html

Trust: 0.8

title:UAG-KB2649262-v4.0.1773.10190-ENUurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42936

Trust: 0.6

title:UAG-KB2649261-v4.0.1753.10076-ENUurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42935

Trust: 0.6

sources: JVNDB: JVNDB-2012-002029 // CNNVD: CNNVD-201204-120

EXTERNAL IDS

db:NVDid:CVE-2012-0147

Trust: 2.8

db:USCERTid:TA12-101A

Trust: 2.0

db:SECUNIAid:48787

Trust: 1.8

db:BIDid:52909

Trust: 1.4

db:SECTRACKid:1026909

Trust: 1.1

db:OSVDBid:81132

Trust: 1.1

db:JVNDBid:JVNDB-2012-002029

Trust: 0.8

db:CNNVDid:CNNVD-201204-120

Trust: 0.7

db:MSid:MS12-026

Trust: 0.6

db:NSFOCUSid:19327

Trust: 0.6

db:VULHUBid:VHN-53428

Trust: 0.1

db:PACKETSTORMid:111723

Trust: 0.1

db:PACKETSTORMid:111753

Trust: 0.1

sources: VULHUB: VHN-53428 // BID: 52909 // JVNDB: JVNDB-2012-002029 // PACKETSTORM: 111723 // PACKETSTORM: 111753 // CNNVD: CNNVD-201204-120 // NVD: CVE-2012-0147

REFERENCES

url:http://www.us-cert.gov/cas/techalerts/ta12-101a.html

Trust: 2.0

url:http://secunia.com/advisories/48787

Trust: 1.7

url:http://www.securityfocus.com/bid/52909

Trust: 1.1

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-026

Trust: 1.1

url:http://osvdb.org/81132

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a15557

Trust: 1.1

url:http://www.securitytracker.com/id?1026909

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/74368

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0147

Trust: 0.8

url:http://www.jpcert.or.jp/at/2012/at120012.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta12-101a

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0147

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/#topics

Trust: 0.8

url:http://technet.microsoft.com/security/bulletin/ms12-026

Trust: 0.6

url:http://www.nsfocus.net/vulndb/19327

Trust: 0.6

url:http://technet.microsoft.com/en-us/security/bulletin/ms12-026

Trust: 0.4

url:http://www.microsoft.com

Trust: 0.3

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48787

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/48787/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/48787/#comments

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://www.us-cert.gov/legal.html#notify

Trust: 0.1

url:http://windows.microsoft.com/en-us/windows-vista/turn-automatic-updating-on-or-off>

Trust: 0.1

url:http://technet.microsoft.com/en-us/security/bulletin/ms12-apr>

Trust: 0.1

url:https://www.update.microsoft.com/>

Trust: 0.1

url:http://www.microsoft.com/security/updates/mu.aspx>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html

Trust: 0.1

url:http://technet.microsoft.com/en-us/wsus/default.aspx>

Trust: 0.1

sources: VULHUB: VHN-53428 // BID: 52909 // JVNDB: JVNDB-2012-002029 // PACKETSTORM: 111723 // PACKETSTORM: 111753 // CNNVD: CNNVD-201204-120 // NVD: CVE-2012-0147

CREDITS

Microsoft

Trust: 0.3

sources: BID: 52909

SOURCES

db:VULHUBid:VHN-53428
db:BIDid:52909
db:JVNDBid:JVNDB-2012-002029
db:PACKETSTORMid:111723
db:PACKETSTORMid:111753
db:CNNVDid:CNNVD-201204-120
db:NVDid:CVE-2012-0147

LAST UPDATE DATE

2025-04-11T20:35:30.025000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-53428date:2018-10-12T00:00:00
db:BIDid:52909date:2012-04-10T00:00:00
db:JVNDBid:JVNDB-2012-002029date:2012-04-16T00:00:00
db:CNNVDid:CNNVD-201204-120date:2012-04-11T00:00:00
db:NVDid:CVE-2012-0147date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-53428date:2012-04-10T00:00:00
db:BIDid:52909date:2012-04-10T00:00:00
db:JVNDBid:JVNDB-2012-002029date:2012-04-12T00:00:00
db:PACKETSTORMid:111723date:2012-04-11T06:18:00
db:PACKETSTORMid:111753date:2012-04-11T15:07:01
db:CNNVDid:CNNVD-201204-120date:2012-04-11T00:00:00
db:NVDid:CVE-2012-0147date:2012-04-10T21:55:01.500