Executive Summary

Informations
Name CVE-2013-3128 First vendor Publication 2013-10-09
Vendor Cve Last vendor Modification 2020-12-08

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5, allow remote attackers to execute arbitrary code via a crafted OpenType font (OTF) file, aka "OpenType Font Parsing Vulnerability."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3128

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:18847
 
Oval ID: oval:org.mitre.oval:def:18847
Title: OpenType Font Parsing Vulnerability (CVE-2013-3128) - MS13-081, MS13-082
Description: The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5, allow remote attackers to execute arbitrary code via a crafted OpenType font (OTF) file, aka "OpenType Font Parsing Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3128
Version: 14
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Microsoft .NET Framework 3.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.0
Microsoft .NET Framework 4.5
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 2
Os 2
Os 1
Os 3
Os 5
Os 1
Os 2
Os 2

ExploitDB Exploits

id Description
2014-02-11 Windows TrackPopupMenuEx Win32k NULL Page

Information Assurance Vulnerability Management (IAVM)

Date Description
2013-12-12 IAVM : 2013-A-0232 - Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers
Severity : Category I - VMSKEY : V0042582
2013-10-10 IAVM : 2013-A-0187 - Multiple Vulnerabilities in Microsoft .NET Framework
Severity : Category I - VMSKEY : V0040753
2013-10-10 IAVM : 2013-A-0190 - Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers
Severity : Category I - VMSKEY : V0040763

Snort® IPS/IDS

Date Description
2014-04-24 ATMFD Adobe font driver reserved command denial of service attempt
RuleID : 30241 - Revision : 2 - Type : FILE-OTHER
2014-04-24 ATMFD Adobe font driver reserved command denial of service attempt
RuleID : 30240 - Revision : 2 - Type : FILE-OTHER
2014-01-10 ATMFD Adobe font driver reserved command denial of service attempt
RuleID : 28203 - Revision : 4 - Type : FILE-OTHER
2014-01-10 ATMFD Adobe font driver reserved command denial of service attempt
RuleID : 28202 - Revision : 3 - Type : FILE-OTHER
2014-01-10 Microsoft .NET XML digital signature denial of service attempt
RuleID : 28162 - Revision : 4 - Type : FILE-OTHER
2014-01-10 Microsoft .NET XML digital signature denial of service attempt
RuleID : 28161 - Revision : 4 - Type : FILE-OTHER

Nessus® Vulnerability Scanner

Date Description
2013-10-09 Name : The Windows kernel drivers on the remote host are affected by multiple vulner...
File : smb_nt_ms13-081.nasl - Type : ACT_GATHER_INFO
2013-10-09 Name : The .NET Framework install on the remote Windows host could allow arbitrary c...
File : smb_nt_ms13-082.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CERT http://www.us-cert.gov/ncas/alerts/TA13-288A
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13...
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13...
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Date Informations
2021-05-04 12:26:52
  • Multiple Updates
2021-04-22 01:32:33
  • Multiple Updates
2020-12-08 21:24:05
  • Multiple Updates
2020-11-24 12:10:26
  • Multiple Updates
2020-09-28 17:22:46
  • Multiple Updates
2020-05-23 00:37:33
  • Multiple Updates
2019-05-09 12:05:26
  • Multiple Updates
2019-02-26 17:19:39
  • Multiple Updates
2018-10-13 05:18:39
  • Multiple Updates
2017-09-19 09:26:11
  • Multiple Updates
2014-04-24 21:21:57
  • Multiple Updates
2014-02-17 11:20:26
  • Multiple Updates
2014-01-19 21:29:23
  • Multiple Updates
2014-01-10 17:19:30
  • Multiple Updates
2013-12-20 13:19:25
  • Multiple Updates
2013-11-11 12:40:29
  • Multiple Updates
2013-11-04 21:27:41
  • Multiple Updates
2013-10-10 21:23:18
  • Multiple Updates
2013-10-09 21:21:16
  • First insertion