4.3
CVSSv2

CVE-2012-0152

Published: 13/03/2012 Updated: 28/09/2020
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 446
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The Remote Desktop Protocol (RDP) service in Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 allows remote malicious users to cause a denial of service (application hang) via a series of crafted packets, aka "Terminal Server Denial of Service Vulnerability."

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2008 r2

microsoft windows 7

Nmap Scripts

rdp-vuln-ms12-020

Checks if a machine is vulnerable to MS12-020 RDP vulnerability.

nmap -sV --script=rdp-vuln-ms12-020 -p 3389 <target>

PORT STATE SERVICE VERSION 3389/tcp open ms-wbt-server? | rdp-vuln-ms12-020: | VULNERABLE: | MS12-020 Remote Desktop Protocol Denial Of Service Vulnerability | State: VULNERABLE | IDs: CVE:CVE-2012-0152 | Risk factor: Medium CVSSv2: 4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:N/A:P) | Description: | Remote Desktop Protocol vulnerability that could allow remote attackers to cause a denial of service. | | Disclosure date: 2012-03-13 | References: | http://technet.microsoft.com/en-us/security/bulletin/ms12-020 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0152 | | MS12-020 Remote Desktop Protocol Remote Code Execution Vulnerability | State: VULNERABLE | IDs: CVE:CVE-2012-0002 | Risk factor: High CVSSv2: 9.3 (HIGH) (AV:N/AC:M/Au:N/C:C/I:C/A:C) | Description: | Remote Desktop Protocol vulnerability that could allow remote attackers to execute arbitrary code on the targeted system. | | Disclosure date: 2012-03-13 | References: | http://technet.microsoft.com/en-us/security/bulletin/ms12-020 |_ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0002

Github Repositories

THM-Blue 3/1/2022 | Yash Mhaskar Nmap 791 scan initiated Sun Feb 27 16:45:34 2022 as: nmap -A -T4 -sV --script vuln -oN nmaptxt 1010188114 Nmap scan report for 1010188114 Host is up (018s latency) Not shown: 991 closed ports PORT STATE SERVICE VERSION 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-s

This repo contain walkthrough of buffer overflow room on tryhackme. In this walkthrough we are going to cover every details about how to exploit stack buffer overflow vulnerability.

Gatekeeper Walkthrough Nmap Let's first scan machine ip with nmap, we are going to divide nmap scan in two section initial scan and final scan In Initial scan we are going to cover nmap fast scan of ports and other things In Final scan we are going to cover nmap full port scan with vuln script Nmap Initial Scan command=&gt; sudo nmap -F -sV 101018296 -oN nmap-i

CVE -2012-0152

MS12-020 CVE -2012-0152 Windows Remote Desktop Protocol Bugs Let Remote Users Deny Service and Execute Arbitrary Code SecurityTracker Alert ID: 1026790 SecurityTracker URL: securitytrackercom/id/1026790 CVE Reference: CVE-2012-0002, CVE-2012-0152 (Links to External Site) Updated: Jun 13 2012 Original Entry Date: Mar 13 2012 Impact: Denial of service via networ

CVE-2012-0152

RDP_jammer CVE-2012-0152 exploit using metasploit and BASH SYNTAX : Scriptsh &lt;IP_ADDRESS&gt; &lt;NUMBER_OF_ATTACK&gt;