Executive Summary
Summary | |
---|---|
Title | Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2859537) |
Informations | |||
---|---|---|---|
Name | MS13-063 | First vendor Publication | 2013-08-13 |
Vendor | Microsoft | Last vendor Modification | 2013-09-13 |
Severity (Vendor) | Important | Revision | 1.2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V1.2 (September 13, 2013): Corrected update replacement for all affected software excluding Windows XP and Windows 8. This is an informational change only. |
Original Source
Url : http://technet.microsoft.com/en-us/security/bulletin/ms13-063 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18132 | |||
Oval ID: | oval:org.mitre.oval:def:18132 | ||
Title: | ASLR Security Feature Bypass Vulnerability - MS13-063 | ||
Description: | Unspecified vulnerability in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 through SP1 allows attackers to bypass the ASLR protection mechanism via unknown vectors, as demonstrated against Adobe Flash Player by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "ASLR Security Feature Bypass Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-2556 | Version: | 3 |
Platform(s): | Microsoft Windows Vista Microsoft Windows Server 2008 R2 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18175 | |||
Oval ID: | oval:org.mitre.oval:def:18175 | ||
Title: | Windows Kernel Memory Corruption Vulnerability - MS13-063 | ||
Description: | The NT Virtual DOS Machine (NTVDM) subsystem in the kernel in Microsoft Windows XP SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 on 32-bit platforms does not properly validate kernel-memory addresses, which allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Windows Kernel Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3197 and CVE-2013-3198. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3196 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 8 Microsoft Windows 7 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18364 | |||
Oval ID: | oval:org.mitre.oval:def:18364 | ||
Title: | Windows Kernel Memory Corruption Vulnerability - MS13-063 | ||
Description: | The NT Virtual DOS Machine (NTVDM) subsystem in the kernel in Microsoft Windows XP SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 on 32-bit platforms does not properly validate kernel-memory addresses, which allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Windows Kernel Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3196 and CVE-2013-3198. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3197 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 8 Microsoft Windows 7 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18421 | |||
Oval ID: | oval:org.mitre.oval:def:18421 | ||
Title: | Windows Kernel Memory Corruption Vulnerability - MS13-063 | ||
Description: | The NT Virtual DOS Machine (NTVDM) subsystem in the kernel in Microsoft Windows XP SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 on 32-bit platforms does not properly validate kernel-memory addresses, which allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Windows Kernel Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3196 and CVE-2013-3197. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3198 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 8 Microsoft Windows 7 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2014-04-21 | Adobe Flash Player Regular Expression Heap Overflow |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2013-08-15 | IAVM : 2013-B-0088 - Multiple Privilege Escalation Vulnerabilities in Microsoft Windows Kernel Severity : Category I - VMSKEY : V0040045 |
Metasploit Database
id | Description |
---|---|
2013-02-08 | Adobe Flash Player Regular Expression Heap Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-08-14 | Name : The Windows kernel on the remote host is affected by multiple vulnerabilities. File : smb_nt_ms13-063.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2020-05-23 13:17:14 |
|
2016-04-27 02:02:33 |
|
2014-04-22 17:19:55 |
|
2014-04-18 09:23:19 |
|
2014-02-17 11:47:44 |
|
2013-11-11 12:41:35 |
|
2013-09-14 00:18:21 |
|
2013-08-14 21:17:26 |
|
2013-08-14 13:24:29 |
|
2013-08-13 21:20:15 |
|