Executive Summary

Informations
Name CVE-2013-3154 First vendor Publication 2013-07-09
Vendor Cve Last vendor Modification 2018-10-30

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 6.9 Attack Range Local
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 3.4 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The signature-update functionality in Windows Defender on Microsoft Windows 7 and Windows Server 2008 R2 relies on an incorrect pathname, which allows local users to gain privileges via a Trojan horse application in the %SYSTEMDRIVE% top-level directory, aka "Microsoft Windows 7 Defender Improper Pathname Vulnerability."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3154

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:17253
 
Oval ID: oval:org.mitre.oval:def:17253
Title: Microsoft Windows Defender Improper Pathname Vulnerability - MS13-058
Description: The signature-update functionality in Windows Defender on Microsoft Windows 7 and Windows Server 2008 R2 relies on an incorrect pathname, which allows local users to gain privileges via a Trojan horse application in the %SYSTEMDRIVE% top-level directory, aka "Microsoft Windows 7 Defender Improper Pathname Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3154
Version: 9
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2008 R2
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 1
Os 1

Information Assurance Vulnerability Management (IAVM)

Date Description
2013-07-11 IAVM : 2013-A-0137 - Microsoft Windows Defender Privilege Escalation Vulnerability
Severity : Category II - VMSKEY : V0039210

Nessus® Vulnerability Scanner

Date Description
2013-07-10 Name : The remote host is affected by a privilege escalation vulnerability.
File : smb_nt_ms13-058.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CERT http://www.us-cert.gov/ncas/alerts/TA13-190A
CONFIRM http://blogs.technet.com/b/srd/archive/2013/07/09/assessing-risk-for-the-july...
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13...
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
Date Informations
2020-05-23 00:37:33
  • Multiple Updates
2018-10-31 00:20:32
  • Multiple Updates
2018-10-13 05:18:40
  • Multiple Updates
2017-09-19 09:26:11
  • Multiple Updates
2016-10-20 00:24:08
  • Multiple Updates
2016-08-05 12:04:26
  • Multiple Updates
2016-04-26 23:23:32
  • Multiple Updates
2014-02-17 11:20:31
  • Multiple Updates
2013-11-11 12:40:30
  • Multiple Updates
2013-11-04 21:27:47
  • Multiple Updates
2013-07-20 17:19:36
  • Multiple Updates
2013-07-11 09:26:04
  • Multiple Updates
2013-07-10 21:19:46
  • Multiple Updates
2013-07-10 13:20:19
  • First insertion