Executive Summary

Summary
Title Vulnerabilities in .NET Framework Could Allow Spoofing (2836440)
Informations
Name MS13-040 First vendor Publication 2013-05-14
Vendor Microsoft Last vendor Modification 2013-05-29
Severity (Vendor) Important Revision 1.1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Revision Note: V1.1 (May 29, 2013): Added a Non-Applicable Software table to identify platforms on which the .NET Framework is not installable.

Summary: This security update resolves one privately reported vulnerability and one publicly disclosed vulnerability in the .NET Framework. The more severe of the vulnerabilities could allow spoofing if a .NET application receives a specially crafted XML file. An attacker who successfully exploited the vulnerabilities could modify the contents of an XML file without invalidating the file's signature and could gain access to endpoint functions as if they were an authenticated user.

Original Source

Url : http://technet.microsoft.com/en-us/security/bulletin/ms13-040

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-287 Improper Authentication
50 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:16559
 
Oval ID: oval:org.mitre.oval:def:16559
Title: Microsoft .NET Framework Common Language Runtime spoofing vulnerability - (CVE-2013-1336) MS13-040
Description: The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly check signatures, which allows remote attackers to make undetected changes to signed XML documents via unspecified vectors that preserve signature validity, aka "XML Digital Signature Spoofing Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-1336
Version: 7
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Microsoft .NET Framework 2.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.0
Microsoft .NET Framework 4.5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:16741
 
Oval ID: oval:org.mitre.oval:def:16741
Title: Mircosoft .NET Framework authentication bypass vulnerability - (CVE-2013-1337) MS13-040
Description: Microsoft .NET Framework 4.5 does not properly create policy requirements for custom Windows Communication Foundation (WCF) endpoint authentication in certain situations involving passwords over HTTPS, which allows remote attackers to bypass authentication by sending queries to an endpoint, aka "Authentication Bypass Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-1337
Version: 5
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Microsoft .NET Framework 4.5
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 5

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Internet Explorer XML digital signature transformation of digest value
RuleID : 26640 - Revision : 7 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer XML digital signature transformation of digest value
RuleID : 26639 - Revision : 7 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

Date Description
2013-05-15 Name : The version of the .NET Framework installed on the remote host is affected by...
File : smb_nt_ms13-040.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
Date Informations
2016-04-27 02:01:47
  • Multiple Updates
2014-02-17 11:47:39
  • Multiple Updates
2014-01-19 21:30:57
  • Multiple Updates
2013-11-04 21:33:43
  • Multiple Updates
2013-05-30 05:16:49
  • Multiple Updates
2013-05-16 17:04:49
  • Multiple Updates
2013-05-15 13:21:21
  • Multiple Updates
2013-05-14 21:15:46
  • First insertion