Executive Summary
Summary | |
---|---|
Title | Cumulative Security Update for Internet Explorer |
Informations | |||
---|---|---|---|
Name | MS13-097 | First vendor Publication | 2013-12-10 |
Vendor | Microsoft | Last vendor Modification | 2013-12-10 |
Severity (Vendor) | Version | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Severity Rating: Critical |
Original Source
Url : https://technet.microsoft.com/en-us/library/security/MS13-097 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
71 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
29 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:20216 | |||
Oval ID: | oval:org.mitre.oval:def:20216 | ||
Title: | Internet Explorer Elevation of Privilege Vulnerability (CVE-2013-5045) - MS13-097 | ||
Description: | Microsoft Internet Explorer 10 and 11 allows local users to bypass the Protected Mode protection mechanism, and consequently gain privileges, by leveraging the ability to execute sandboxed code, aka "Internet Explorer Elevation of Privilege Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-5045 | Version: | 6 |
Platform(s): | Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows 8.1 | Product(s): | Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20614 | |||
Oval ID: | oval:org.mitre.oval:def:20614 | ||
Title: | Internet Explorer Memory Corruption Vulnerability (CVE-2013-5047) - MS13-097 | ||
Description: | Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-5048. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-5047 | Version: | 6 |
Platform(s): | Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows 8.1 | Product(s): | Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20757 | |||
Oval ID: | oval:org.mitre.oval:def:20757 | ||
Title: | Internet Explorer Memory Corruption Vulnerability (CVE-2013-5052) - MS13-097 | ||
Description: | Microsoft Internet Explorer 7 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-5052 | Version: | 6 |
Platform(s): | Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 | Product(s): | Microsoft Internet Explorer 7 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20776 | |||
Oval ID: | oval:org.mitre.oval:def:20776 | ||
Title: | Internet Explorer Elevation of Privilege Vulnerability (CVE-2013-5046) - MS13-097 | ||
Description: | Microsoft Internet Explorer 7 through 11 allows local users to bypass the Protected Mode protection mechanism, and consequently gain privileges, by leveraging the ability to execute sandboxed code, aka "Internet Explorer Elevation of Privilege Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-5046 | Version: | 6 |
Platform(s): | Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows 8.1 | Product(s): | Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20779 | |||
Oval ID: | oval:org.mitre.oval:def:20779 | ||
Title: | Internet Explorer Memory Corruption Vulnerability (CVE-2013-5051) - MS13-097 | ||
Description: | Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-5051 | Version: | 6 |
Platform(s): | Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows 8.1 | Product(s): | Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21026 | |||
Oval ID: | oval:org.mitre.oval:def:21026 | ||
Title: | Internet Explorer Memory Corruption Vulnerability (CVE-2013-5048) - MS13-097 | ||
Description: | Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-5047. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-5048 | Version: | 5 |
Platform(s): | Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows 8.1 | Product(s): | Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 Microsoft Internet Explorer 10 Microsoft Internet Explorer 11 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21053 | |||
Oval ID: | oval:org.mitre.oval:def:21053 | ||
Title: | Internet Explorer Memory Corruption Vulnerability (CVE-2013-5049) - MS13-097 | ||
Description: | Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-5049 | Version: | 5 |
Platform(s): | Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2014-06-27 | MS13-097 Registry Symlink IE Sandbox Escape |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2013-12-12 | IAVM : 2013-A-0223 - Cumulative Security Update for Microsoft Internet Explorer Severity : Category I - VMSKEY : V0042584 |
Snort® IPS/IDS
Date | Description |
---|---|
2015-03-12 | Microsoft Internet Explorer EPM MOTWCreateFileW file access bypass attempt RuleID : 33321 - Revision : 5 - Type : BROWSER-IE |
2015-03-12 | Microsoft Internet Explorer EPM MOTWCreateFileW file access bypass attempt RuleID : 33319 - Revision : 5 - Type : BROWSER-IE |
2014-11-16 | Microsoft Internet Explorer GetClassObject use after free attempt RuleID : 31763 - Revision : 2 - Type : BROWSER-IE |
2014-11-16 | Microsoft Internet Explorer GetClassObject use after free attempt RuleID : 31762 - Revision : 2 - Type : BROWSER-IE |
2014-11-16 | Microsoft Internet Explorer GetClassObject use after free attempt RuleID : 31761 - Revision : 2 - Type : BROWSER-IE |
2014-11-16 | Microsoft Internet Explorer GetClassObject use after free attempt RuleID : 31760 - Revision : 2 - Type : BROWSER-IE |
2014-05-08 | Microsoft Internet Explorer GetClassObject use after free attempt RuleID : 30506 - Revision : 5 - Type : BROWSER-IE |
2014-05-08 | Microsoft Internet Explorer GetClassObject use after free attempt RuleID : 30505 - Revision : 5 - Type : BROWSER-IE |
2014-05-08 | Microsoft Internet Explorer GetClassObject use after free attempt RuleID : 30504 - Revision : 6 - Type : BROWSER-IE |
2014-05-08 | Microsoft Internet Explorer GetClassObject use after free attempt RuleID : 30503 - Revision : 5 - Type : BROWSER-IE |
2014-01-23 | Microsoft Internet Explorer 8 CElement Use After Free exploit attempt RuleID : 29036 - Revision : 3 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer 8 CElement Use After Free exploit attempt RuleID : 28880 - Revision : 4 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer GetClassObject use after free attempt RuleID : 28878 - Revision : 6 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer GetClassObject use after free attempt RuleID : 28877 - Revision : 6 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer GetClassObject use after free attempt RuleID : 28876 - Revision : 7 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer GetClassObject use after free attempt RuleID : 28875 - Revision : 6 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer use after free attempt RuleID : 28874 - Revision : 2 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer use after free attempt RuleID : 28873 - Revision : 2 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer table sub structure use after free attempt RuleID : 28866 - Revision : 2 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer table sub structure use after free attempt RuleID : 28865 - Revision : 2 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer CViewportChangeInvalidation use after free attempt RuleID : 28863 - Revision : 3 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer CViewportChangeInvalidation use after free attempt RuleID : 28862 - Revision : 3 - Type : BROWSER-IE |
Metasploit Database
id | Description |
---|---|
2013-12-10 | MS13-097 Registry Symlink IE Sandbox Escape |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-12-11 | Name : The remote host has a web browser that is affected by multiple vulnerabilities. File : smb_nt_ms13-097.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2020-05-23 13:17:14 |
|
2014-11-16 21:25:25 |
|
2014-06-28 17:24:59 |
|
2014-06-26 21:24:42 |
|
2014-05-08 21:26:09 |
|
2014-05-06 11:35:11 |
|
2014-05-06 11:33:33 |
|
2014-04-19 00:26:11 |
|
2014-04-19 00:18:32 |
|
2014-04-18 21:28:40 |
|
2014-04-18 21:19:50 |
|
2014-04-18 17:26:26 |
|
2014-04-18 17:18:59 |
|
2014-04-18 13:29:57 |
|
2014-04-18 13:20:22 |
|
2014-04-18 09:27:12 |
|
2014-04-18 09:19:15 |
|
2014-04-18 05:28:04 |
|
2014-04-18 05:20:24 |
|
2014-04-18 00:26:24 |
|
2014-04-18 00:19:09 |
|
2014-04-17 21:26:02 |
|
2014-04-17 21:19:38 |
|
2014-04-17 17:26:40 |
|
2014-04-17 17:19:16 |
|
2014-04-17 13:29:35 |
|
2014-04-17 13:19:55 |
|
2014-04-17 09:07:55 |
|
2014-02-17 11:47:52 |
|
2014-01-23 21:20:30 |
|
2014-01-19 21:31:00 |
|
2013-12-13 21:19:30 |
|
2013-12-11 21:24:25 |
|
2013-12-11 13:22:09 |
|
2013-12-10 21:16:24 |
|