Executive Summary

Summary
Title Vulnerabilities in Kernel
Informations
Name MS13-046 First vendor Publication 2013-05-14
Vendor Microsoft Last vendor Modification 2013-12-16
Severity (Vendor) Version Revision 1.1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V1.1 (December 16, 2013): Revised bulletin to announce a detection change to correct an offering issue for Windows RT (2829361) and Windows RT (2830290). This is a detection change only. There were no changes to the update files. Customers who have successfully installed the update do not need to take any action.
Summary: This security update resolves three reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs onto the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS13-046

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:16091
 
Oval ID: oval:org.mitre.oval:def:16091
Title: Win32k Window Handle Vulnerability - MS13-046
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Window Handle Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-1334
Version: 4
Platform(s): Microsoft Windows XP
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:16332
 
Oval ID: oval:org.mitre.oval:def:16332
Title: DirectX Graphics Kernel Subsystem Double Fetch Vulnerability - MS13-046
Description: dxgkrnl.sys (aka the DirectX graphics kernel subsystem) in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "DirectX Graphics Kernel Subsystem Double Fetch Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-1332
Version: 6
Platform(s): Microsoft Windows Server 2012
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:16769
 
Oval ID: oval:org.mitre.oval:def:16769
Title: Win32k Buffer Overflow Vulnerability - MS13-046
Description: Buffer overflow in win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1 allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Win32k Buffer Overflow Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-1333
Version: 3
Platform(s): Microsoft Windows 7
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 4
Os 2
Os 1
Os 1
Os 4
Os 1
Os 2
Os 2

Snort® IPS/IDS

Date Description
2017-03-01 Microsoft Windows Win32 Divide Error Exception Denial of Service attempt
RuleID : 41465 - Revision : 2 - Type : FILE-EXECUTABLE
2017-03-01 Microsoft Windows Win32 Divide Error Exception Denial of Service attempt
RuleID : 41464 - Revision : 2 - Type : FILE-EXECUTABLE
2017-03-01 Microsoft Windows Win32 Divide Error Exception Denial of Service attempt
RuleID : 41463 - Revision : 2 - Type : FILE-EXECUTABLE
2017-03-01 Microsoft Windows Win32 Divide Error Exception Denial of Service attempt
RuleID : 41462 - Revision : 2 - Type : FILE-EXECUTABLE

Nessus® Vulnerability Scanner

Date Description
2013-05-15 Name : The Windows kernel on the remote host is affected by multiple vulnerabilities.
File : smb_nt_ms13-046.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Date Informations
2016-04-27 02:01:56
  • Multiple Updates
2014-05-06 11:35:08
  • Multiple Updates
2014-05-06 11:32:57
  • Multiple Updates
2014-04-19 00:26:07
  • Multiple Updates
2014-04-19 00:18:06
  • Multiple Updates
2014-04-18 21:28:36
  • Multiple Updates
2014-04-18 21:19:26
  • Multiple Updates
2014-04-18 17:26:22
  • Multiple Updates
2014-04-18 17:18:31
  • Multiple Updates
2014-04-18 13:29:53
  • Multiple Updates
2014-04-18 13:19:49
  • Multiple Updates
2014-04-18 09:27:08
  • Multiple Updates
2014-04-18 09:19:00
  • Multiple Updates
2014-04-18 05:28:01
  • Multiple Updates
2014-04-18 05:20:03
  • Multiple Updates
2014-04-18 00:26:20
  • Multiple Updates
2014-04-18 00:18:31
  • Multiple Updates
2014-04-17 21:25:58
  • Multiple Updates
2014-04-17 21:19:23
  • Multiple Updates
2014-04-17 17:26:36
  • Multiple Updates
2014-04-17 17:18:19
  • Multiple Updates
2014-04-17 13:29:30
  • Multiple Updates
2014-04-17 13:19:44
  • Multiple Updates
2014-04-17 09:07:53
  • Multiple Updates
2014-02-17 11:47:41
  • Multiple Updates
2013-12-17 05:16:02
  • Multiple Updates
2013-11-04 21:33:44
  • Multiple Updates
2013-05-16 17:04:50
  • Multiple Updates
2013-05-15 13:21:22
  • Multiple Updates
2013-05-14 21:15:37
  • First insertion