Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2013-3128 | First vendor Publication | 2013-10-09 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5, allow remote attackers to execute arbitrary code via a crafted OpenType font (OTF) file, aka "OpenType Font Parsing Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3128 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18847 | |||
Oval ID: | oval:org.mitre.oval:def:18847 | ||
Title: | OpenType Font Parsing Vulnerability (CVE-2013-3128) - MS13-081, MS13-082 | ||
Description: | The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5, allow remote attackers to execute arbitrary code via a crafted OpenType font (OTF) file, aka "OpenType Font Parsing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3128 | Version: | 14 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP Microsoft Windows 8 Microsoft Windows Server 2012 | Product(s): | Microsoft .NET Framework 3.0 Microsoft .NET Framework 3.5 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.0 Microsoft .NET Framework 4.5 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2014-02-11 | Windows TrackPopupMenuEx Win32k NULL Page |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2013-12-12 | IAVM : 2013-A-0232 - Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers Severity : Category I - VMSKEY : V0042582 |
2013-10-10 | IAVM : 2013-A-0187 - Multiple Vulnerabilities in Microsoft .NET Framework Severity : Category I - VMSKEY : V0040753 |
2013-10-10 | IAVM : 2013-A-0190 - Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers Severity : Category I - VMSKEY : V0040763 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-04-24 | ATMFD Adobe font driver reserved command denial of service attempt RuleID : 30241 - Revision : 2 - Type : FILE-OTHER |
2014-04-24 | ATMFD Adobe font driver reserved command denial of service attempt RuleID : 30240 - Revision : 2 - Type : FILE-OTHER |
2014-01-10 | ATMFD Adobe font driver reserved command denial of service attempt RuleID : 28203 - Revision : 4 - Type : FILE-OTHER |
2014-01-10 | ATMFD Adobe font driver reserved command denial of service attempt RuleID : 28202 - Revision : 3 - Type : FILE-OTHER |
2014-01-10 | Microsoft .NET XML digital signature denial of service attempt RuleID : 28162 - Revision : 4 - Type : FILE-OTHER |
2014-01-10 | Microsoft .NET XML digital signature denial of service attempt RuleID : 28161 - Revision : 4 - Type : FILE-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-10-09 | Name : The Windows kernel drivers on the remote host are affected by multiple vulner... File : smb_nt_ms13-081.nasl - Type : ACT_GATHER_INFO |
2013-10-09 | Name : The .NET Framework install on the remote Windows host could allow arbitrary c... File : smb_nt_ms13-082.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 12:35:36 |
|
2021-05-04 12:26:52 |
|
2021-04-22 01:32:33 |
|
2020-12-08 21:24:05 |
|
2020-11-24 12:10:26 |
|
2020-09-28 17:22:46 |
|
2020-05-23 00:37:33 |
|
2019-05-09 12:05:26 |
|
2019-02-26 17:19:39 |
|
2018-10-13 05:18:39 |
|
2017-09-19 09:26:11 |
|
2014-04-24 21:21:57 |
|
2014-02-17 11:20:26 |
|
2014-01-19 21:29:23 |
|
2014-01-10 17:19:30 |
|
2013-12-20 13:19:25 |
|
2013-11-11 12:40:29 |
|
2013-11-04 21:27:41 |
|
2013-10-10 21:23:18 |
|
2013-10-09 21:21:16 |
|