Executive Summary

Summary
Title Vulnerabilities in .NET Framework Could Allow Remote Code Execution
Informations
Name MS13-082 First vendor Publication 2013-10-08
Vendor Microsoft Last vendor Modification 2016-04-07
Severity (Vendor) Critical Revision 1.2

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Critical
Revision Note: V1.2 (April 7, 2016): Corrected download links for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows 2008 R2. This is an informational change only. Customers who have already successfully updated their systems do not need to take any action.
Summary: This security update resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if a user visits a website containing a specially crafted OpenType font (OTF) file using a browser capable of instantiating XBAP applications.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS13-082

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:18517
 
Oval ID: oval:org.mitre.oval:def:18517
Title: Entity Expansion Vulnerability (CVE-2013-3860) - MS13-082
Description: Microsoft .NET Framework 2.0 SP2, 3.5, 3.5 SP1, 3.5.1, 4, and 4.5 does not properly parse a DTD during XML digital-signature validation, which allows remote attackers to cause a denial of service (application crash or hang) via a crafted signed XML document, aka "Entity Expansion Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3860
Version: 10
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Microsoft .NET Framework 2.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.0
Microsoft .NET Framework 4.5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18842
 
Oval ID: oval:org.mitre.oval:def:18842
Title: JSON Parsing Vulnerability (CVE-2013-3861) - MS13-082
Description: Microsoft .NET Framework 2.0 SP2, 3.5, 3.5 SP1, 3.5.1, 4, and 4.5 allows remote attackers to cause a denial of service (application crash or hang) via crafted character sequences in JSON data, aka "JSON Parsing Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3861
Version: 10
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Microsoft .NET Framework 2.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.0
Microsoft .NET Framework 4.5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18847
 
Oval ID: oval:org.mitre.oval:def:18847
Title: OpenType Font Parsing Vulnerability (CVE-2013-3128) - MS13-081, MS13-082
Description: The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5, allow remote attackers to execute arbitrary code via a crafted OpenType font (OTF) file, aka "OpenType Font Parsing Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3128
Version: 14
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Microsoft .NET Framework 3.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.0
Microsoft .NET Framework 4.5
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 6
Os 2
Os 2
Os 1
Os 3
Os 5
Os 1
Os 2
Os 2

Information Assurance Vulnerability Management (IAVM)

Date Description
2013-12-12 IAVM : 2013-A-0232 - Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers
Severity : Category I - VMSKEY : V0042582
2013-10-10 IAVM : 2013-A-0187 - Multiple Vulnerabilities in Microsoft .NET Framework
Severity : Category I - VMSKEY : V0040753
2013-10-10 IAVM : 2013-A-0190 - Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers
Severity : Category I - VMSKEY : V0040763

Snort® IPS/IDS

Date Description
2014-04-24 ATMFD Adobe font driver reserved command denial of service attempt
RuleID : 30241 - Revision : 2 - Type : FILE-OTHER
2014-04-24 ATMFD Adobe font driver reserved command denial of service attempt
RuleID : 30240 - Revision : 2 - Type : FILE-OTHER
2014-01-10 ATMFD Adobe font driver reserved command denial of service attempt
RuleID : 28203 - Revision : 4 - Type : FILE-OTHER
2014-01-10 ATMFD Adobe font driver reserved command denial of service attempt
RuleID : 28202 - Revision : 3 - Type : FILE-OTHER
2014-01-10 Microsoft .NET XML digital signature denial of service attempt
RuleID : 28162 - Revision : 4 - Type : FILE-OTHER
2014-01-10 Microsoft .NET XML digital signature denial of service attempt
RuleID : 28161 - Revision : 4 - Type : FILE-OTHER

Nessus® Vulnerability Scanner

Date Description
2013-10-09 Name : The Windows kernel drivers on the remote host are affected by multiple vulner...
File : smb_nt_ms13-081.nasl - Type : ACT_GATHER_INFO
2013-10-09 Name : The .NET Framework install on the remote Windows host could allow arbitrary c...
File : smb_nt_ms13-082.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2016-04-08 00:27:29
  • Multiple Updates
2016-04-08 00:16:10
  • Multiple Updates
2014-04-24 21:21:58
  • Multiple Updates
2014-02-17 11:47:48
  • Multiple Updates
2014-01-19 21:30:59
  • Multiple Updates
2013-11-11 12:41:36
  • Multiple Updates
2013-10-11 00:16:32
  • Multiple Updates
2013-10-09 21:24:24
  • Multiple Updates
2013-10-08 21:25:19
  • Multiple Updates
2013-10-08 21:16:44
  • First insertion