Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2013-1302 | First vendor Publication | 2013-05-14 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft Communicator 2007 R2, Lync 2010, Lync 2010 Attendee, and Lync Server 2013 do not properly handle objects in memory, which allows remote attackers to execute arbitrary code via an invitation that triggers access to a deleted object, aka "Lync RCE Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1302 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:15952 | |||
Oval ID: | oval:org.mitre.oval:def:15952 | ||
Title: | Vulnerability in Lync Could Allow Remote Code Execution - MS13-041 | ||
Description: | Microsoft Communicator 2007 R2, Lync 2010, Lync 2010 Attendee, and Lync Server 2013 do not properly handle objects in memory, which allows remote attackers to execute arbitrary code via an invitation that triggers access to a deleted object, aka "Lync RCE Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-1302 | Version: | 8 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP Microsoft Windows 8 Microsoft Windows Server 2012 | Product(s): | Microsoft Communicator 2007 R2 Microsoft Lync 2010 Microsoft Lync 2010 Attendee Microsoft Lync Server 2013 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 | |
Application | 1 | |
Application | 1 |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2013-05-16 | IAVM : 2013-B-0051 - Microsoft Lync Remote Code Execution Vulnerability Severity : Category II - VMSKEY : V0037938 |
Snort® IPS/IDS
Date | Description |
---|---|
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38011 - Revision : 1 - Type : BROWSER-PLUGINS |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38010 - Revision : 1 - Type : BROWSER-PLUGINS |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38009 - Revision : 1 - Type : BROWSER-PLUGINS |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38008 - Revision : 1 - Type : BROWSER-PLUGINS |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38007 - Revision : 1 - Type : BROWSER-PLUGINS |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38006 - Revision : 1 - Type : BROWSER-PLUGINS |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38005 - Revision : 1 - Type : BROWSER-PLUGINS |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38004 - Revision : 1 - Type : BROWSER-PLUGINS |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38003 - Revision : 1 - Type : BROWSER-PLUGINS |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38002 - Revision : 1 - Type : BROWSER-PLUGINS |
2016-04-05 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 38001 - Revision : 1 - Type : BROWSER-PLUGINS |
2016-04-05 | IE MsRdpClient ActiveX attempt RuleID : 38000 - Revision : 2 - Type : BROWSER-PLUGINS |
2016-04-05 | IE MsRdpClient ActiveX attempt RuleID : 37999 - Revision : 1 - Type : BROWSER-PLUGINS |
2016-04-05 | IE MsRdpClient ActiveX attempt RuleID : 37998 - Revision : 1 - Type : BROWSER-PLUGINS |
2016-04-05 | IE MsRdpClient ActiveX attempt RuleID : 37997 - Revision : 2 - Type : BROWSER-PLUGINS |
2016-04-05 | IE MsRdpClient ActiveX attempt RuleID : 37996 - Revision : 1 - Type : BROWSER-PLUGINS |
2016-04-05 | IE MsRdpClient ActiveX attempt RuleID : 37995 - Revision : 1 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 26365 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 26364 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 26363 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 26362 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 26361 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 26360 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 26359 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 26358 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 26357 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 26356 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Windows RDP ActiveX component mstscax use after free attempt RuleID : 26355 - Revision : 11 - Type : BROWSER-PLUGINS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-05-15 | Name : The remote host is affected by a remote code execution vulnerability. File : smb_nt_ms13-041.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 12:33:53 |
|
2021-05-04 12:24:16 |
|
2021-04-22 01:29:05 |
|
2020-05-23 00:36:25 |
|
2018-10-13 05:18:38 |
|
2017-09-19 09:25:52 |
|
2016-09-30 00:23:50 |
|
2014-02-17 11:17:22 |
|
2014-01-19 21:29:13 |
|
2013-12-31 13:19:08 |
|
2013-11-11 12:40:18 |
|
2013-11-04 21:26:00 |
|
2013-05-16 17:03:08 |
|
2013-05-15 13:18:42 |
|