Executive Summary
Summary | |
---|---|
Title | Vulnerabilities in Windows Kernel |
Informations | |||
---|---|---|---|
Name | MS13-101 | First vendor Publication | 2013-12-10 |
Vendor | Microsoft | Last vendor Modification | 2013-12-10 |
Severity (Vendor) | Version | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Severity Rating: Important |
Original Source
Url : https://technet.microsoft.com/en-us/library/security/MS13-101 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
40 % | CWE-20 | Improper Input Validation |
20 % | CWE-399 | Resource Management Errors |
20 % | CWE-190 | Integer Overflow or Wraparound (CWE/SANS Top 25) |
20 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:20829 | |||
Oval ID: | oval:org.mitre.oval:def:20829 | ||
Title: | TrueType Font Parsing Vulnerability (CVE-2013-3903) - MS13-101 | ||
Description: | Array index error in win32k.sys in the kernel-mode drivers in Microsoft Windows 8, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to cause a denial of service (reboot) via a crafted TrueType font (TTF) file, aka "TrueType Font Parsing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3903 | Version: | 4 |
Platform(s): | Microsoft Windows 8 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20920 | |||
Oval ID: | oval:org.mitre.oval:def:20920 | ||
Title: | Win32k Use After Free Vulnerability (CVE-2013-3902) - MS13-101 | ||
Description: | Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 R2 SP1 and Windows 7 SP1 on 64-bit platforms allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3902 | Version: | 4 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 R2 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20951 | |||
Oval ID: | oval:org.mitre.oval:def:20951 | ||
Title: | Win32k Memory Corruption Vulnerability (CVE-2013-3899) - MS13-101 | ||
Description: | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate addresses, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3899 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20974 | |||
Oval ID: | oval:org.mitre.oval:def:20974 | ||
Title: | Win32k Integer Overflow Vulnerability (CVE-2013-5058) - MS13-101 | ||
Description: | Integer overflow in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows local users to gain privileges via a crafted application, aka "Win32k Integer Overflow Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-5058 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows 8.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21033 | |||
Oval ID: | oval:org.mitre.oval:def:21033 | ||
Title: | Port-Class Driver Double Fetch Vulnerability (CVE-2013-3907) - MS13-101 | ||
Description: | portcls.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Port-Class Driver Double Fetch Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3907 | Version: | 5 |
Platform(s): | Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Vista | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2013-12-17 | Windows Kernel win32k.sys - Integer Overflow (MS13-101) |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2013-12-12 | IAVM : 2013-A-0232 - Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers Severity : Category I - VMSKEY : V0042582 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-12-11 | Name : The Windows kernel drivers on the remote host are affected by multiple vulner... File : smb_nt_ms13-101.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-04-27 02:03:44 |
|
2014-05-06 11:35:12 |
|
2014-05-06 11:33:44 |
|
2014-04-19 00:26:12 |
|
2014-04-19 00:18:53 |
|
2014-04-18 21:28:41 |
|
2014-04-18 21:20:00 |
|
2014-04-18 17:26:28 |
|
2014-04-18 17:19:16 |
|
2014-04-18 13:29:59 |
|
2014-04-18 13:20:15 |
|
2014-04-18 09:27:13 |
|
2014-04-18 09:19:25 |
|
2014-04-18 05:28:06 |
|
2014-04-18 05:20:34 |
|
2014-04-18 00:26:25 |
|
2014-04-18 00:18:56 |
|
2014-04-17 21:26:03 |
|
2014-04-17 21:19:49 |
|
2014-04-17 17:26:41 |
|
2014-04-17 17:18:59 |
|
2014-04-17 13:29:36 |
|
2014-04-17 13:20:07 |
|
2014-04-17 09:07:57 |
|
2014-02-17 11:47:53 |
|
2014-01-05 00:18:31 |
|
2013-12-13 21:19:31 |
|
2013-12-11 21:24:26 |
|
2013-12-11 13:22:10 |
|
2013-12-10 21:16:18 |
|