First published: Wed Apr 25 2012(Updated: )
The intu-help-qb (aka Intuit Help System Async Pluggable Protocol) handlers in HelpAsyncPluggableProtocol.dll in Intuit QuickBooks 2009 through 2012, when Internet Explorer is used, might allow remote attackers to obtain sensitive information via a URI with a % (percent) character as its (1) last or (2) second-to-last character, in situations where a certain "post-URL data" buffer contains a 0x0000 character but a buffer overflow does not occur.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QuickBooks | =2009 | |
QuickBooks | =2010 | |
QuickBooks | =2011 | |
QuickBooks | =2012 | |
Internet Explorer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2420 is classified as a medium severity vulnerability due to its exploitation potential for sensitive information disclosure.
To mitigate CVE-2012-2420, users should upgrade to the latest version of Intuit QuickBooks that addresses this vulnerability.
CVE-2012-2420 affects Intuit QuickBooks versions 2009, 2010, 2011, and 2012.
CVE-2012-2420 can be exploited through a specially crafted URI containing a percent sign that allows remote attackers to reveal sensitive data.
Yes, CVE-2012-2420 requires the use of Internet Explorer for the vulnerability to be exploited.