Executive Summary

Summary
Title Vulnerability in Open Data Protocol Could Allow Denial of Service (2769327)
Informations
Name MS13-007 First vendor Publication 2013-01-08
Vendor Microsoft Last vendor Modification 2013-04-03
Severity (Vendor) Important Revision 1.1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score 7.8 Attack Range Network
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Revision Note: V1.1 (April 3, 2013): Added a mitigation to CVE-2013-0005 for systems running Windows Server 2012.

Summary: This security update resolves a privately reported vulnerability in the Open Data (OData) protocol. The vulnerability could allow denial of service if an unauthenticated attacker sends specially crafted HTTP requests to an affected site. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed.

Original Source

Url : http://technet.microsoft.com/en-us/security/bulletin/ms13-007

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:16282
 
Oval ID: oval:org.mitre.oval:def:16282
Title: Replace Denial of Service Vulnerability - MS13-007
Description: The WCF Replace function in the Open Data (aka OData) protocol implementation in Microsoft .NET Framework 3.5, 3.5 SP1, 3.5.1, and 4, and the Management OData IIS Extension on Windows Server 2012, allows remote attackers to cause a denial of service (resource consumption and daemon restart) via crafted values in HTTP requests, aka "Replace Denial of Service Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-0005
Version: 9
Platform(s): Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Vista
Microsoft Windows XP
Product(s): Management OData IIS Extension
Microsoft .NET Framework 4.0
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 3.5
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 4
Application 1

Information Assurance Vulnerability Management (IAVM)

Date Description
2013-01-10 IAVM : 2013-B-0001 - Microsoft Open Data Protocol Denial of Service Vulnerability
Severity : Category I - VMSKEY : V0036447

Snort® IPS/IDS

Date Description
2014-03-22 Microsoft Windows Server 2012 IIS OData protocol nested replace filter dos at...
RuleID : 29866 - Revision : 2 - Type : SERVER-IIS
2014-03-15 Microsoft Windows Server 2012 IIS OData protocol nested replace filter dos at...
RuleID : 29759 - Revision : 2 - Type : SERVER-IIS
2014-01-10 Microsoft Windows Server 2012 IIS OData protocol nested replace filter dos at...
RuleID : 25274 - Revision : 4 - Type : SERVER-IIS

Nessus® Vulnerability Scanner

Date Description
2013-01-09 Name : The version of the .NET Framework installed on the remote host is affected by...
File : smb_nt_ms13-007.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2016-04-27 02:00:53
  • Multiple Updates
2014-03-22 21:20:53
  • Multiple Updates
2014-03-15 21:20:36
  • Multiple Updates
2014-02-17 11:47:32
  • Multiple Updates
2014-01-19 21:30:55
  • Multiple Updates
2013-11-11 12:41:32
  • Multiple Updates
2013-04-03 21:19:22
  • Multiple Updates
2013-04-03 21:15:42
  • Multiple Updates
2013-02-26 13:20:11
  • Multiple Updates
2013-01-10 00:21:06
  • Multiple Updates
2013-01-09 21:20:49
  • Multiple Updates
2013-01-08 21:18:33
  • First insertion