Executive Summary

Informations
Name TA13-288A First vendor Publication 2013-10-15
Vendor US-CERT Last vendor Modification 2013-10-15
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Overview




Select Microsoft software products contain multiple vulnerabilities. Microsoft has released updates to address these vulnerabilities.





 


Description


The Microsoft Security Bulletin Summary for October 2013 describes multiple vulnerabilities in Microsoft software. Microsoft has released updates to address these vulnerabilities.


Impact





These vulnerabilities could allow remote code execution or information disclosure.





 


Solution




Apply Updates


Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for October 2013, which describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS). Home users are encouraged to enable automatic updates.




 


Original Source

Url : http://www.us-cert.gov/cas/techalerts/TA13-288A.html

CWE : Common Weakness Enumeration

% Id Name
42 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
25 % CWE-399 Resource Management Errors
17 % CWE-20 Improper Input Validation
8 % CWE-264 Permissions, Privileges, and Access Controls
8 % CWE-94 Failure to Control Generation of Code ('Code Injection')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:18366
 
Oval ID: oval:org.mitre.oval:def:18366
Title: Internet Explorer Memory Corruption Vulnerability (CVE-2013-3882) - MS13-080
Description: Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3873, and CVE-2013-3885.
Family: windows Class: vulnerability
Reference(s): CVE-2013-3882
Version: 6
Platform(s): Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product(s): Microsoft Internet Explorer 10
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18517
 
Oval ID: oval:org.mitre.oval:def:18517
Title: Entity Expansion Vulnerability (CVE-2013-3860) - MS13-082
Description: Microsoft .NET Framework 2.0 SP2, 3.5, 3.5 SP1, 3.5.1, 4, and 4.5 does not properly parse a DTD during XML digital-signature validation, which allows remote attackers to cause a denial of service (application crash or hang) via a crafted signed XML document, aka "Entity Expansion Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3860
Version: 10
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Microsoft .NET Framework 2.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.0
Microsoft .NET Framework 4.5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18601
 
Oval ID: oval:org.mitre.oval:def:18601
Title: Internet Explorer Memory Corruption Vulnerability (CVE-2013-3872) - MS13-080
Description: Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3873, CVE-2013-3882, and CVE-2013-3885.
Family: windows Class: vulnerability
Reference(s): CVE-2013-3872
Version: 6
Platform(s): Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product(s): Microsoft Internet Explorer 10
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18614
 
Oval ID: oval:org.mitre.oval:def:18614
Title: Win32k NULL Page Vulnerability (CVE-2013-3881) - MS13-081
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges via a crafted application, aka "Win32k NULL Page Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3881
Version: 4
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2008 R2
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18630
 
Oval ID: oval:org.mitre.oval:def:18630
Title: Windows USB Descriptor Vulnerability (CVE-2013-3200) - MS13-081
Description: The USB drivers in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3200
Version: 6
Platform(s): Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Vista
Microsoft Windows XP
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18643
 
Oval ID: oval:org.mitre.oval:def:18643
Title: Memory Corruption Vulnerability (CVE-2013-3891) - MS13-086
Description: Microsoft Word 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3891
Version: 6
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Microsoft Word 2003
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18665
 
Oval ID: oval:org.mitre.oval:def:18665
Title: Internet Explorer Memory Corruption Vulnerability (CVE-2013-3893) - MS13-080
Description: Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.
Family: windows Class: vulnerability
Reference(s): CVE-2013-3893
Version: 6
Platform(s): Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Vista
Microsoft Windows XP
Product(s): Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18715
 
Oval ID: oval:org.mitre.oval:def:18715
Title: Vulnerability in Windows Common Control Library Could Allow Remote Code Execution (CVE-2013-3195) - MS13-083
Description: The DSA_InsertItem function in Comctl32.dll in the Windows common control library in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly allocate memory, which allows remote attackers to execute arbitrary code via a crafted value in an argument to an ASP.NET web application, aka "Comctl32 Integer Overflow Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3195
Version: 4
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18718
 
Oval ID: oval:org.mitre.oval:def:18718
Title: Win32k Use After Free Vulnerability (CVE-2013-3879) MS13-081
Description: Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3879
Version: 4
Platform(s): Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Vista
Microsoft Windows XP
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18793
 
Oval ID: oval:org.mitre.oval:def:18793
Title: Internet Explorer Memory Corruption Vulnerability (CVE-2013-3874) - MS13-080
Description: Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3874
Version: 5
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Product(s): Microsoft Internet Explorer 9
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18811
 
Oval ID: oval:org.mitre.oval:def:18811
Title: Internet Explorer Memory Corruption Vulnerability (CVE-2013-3886) - MS13-080
Description: Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3886
Version: 5
Platform(s): Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Vista
Product(s): Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18817
 
Oval ID: oval:org.mitre.oval:def:18817
Title: Internet Explorer Memory Corruption Vulnerability (CVE-2013-3885) - MS13-080
Description: Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3873, and CVE-2013-3882.
Family: windows Class: vulnerability
Reference(s): CVE-2013-3885
Version: 5
Platform(s): Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product(s): Microsoft Internet Explorer 10
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18842
 
Oval ID: oval:org.mitre.oval:def:18842
Title: JSON Parsing Vulnerability (CVE-2013-3861) - MS13-082
Description: Microsoft .NET Framework 2.0 SP2, 3.5, 3.5 SP1, 3.5.1, 4, and 4.5 allows remote attackers to cause a denial of service (application crash or hang) via crafted character sequences in JSON data, aka "JSON Parsing Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3861
Version: 10
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Microsoft .NET Framework 2.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.0
Microsoft .NET Framework 4.5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18847
 
Oval ID: oval:org.mitre.oval:def:18847
Title: OpenType Font Parsing Vulnerability (CVE-2013-3128) - MS13-081, MS13-082
Description: The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5, allow remote attackers to execute arbitrary code via a crafted OpenType font (OTF) file, aka "OpenType Font Parsing Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3128
Version: 14
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Microsoft .NET Framework 3.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.0
Microsoft .NET Framework 4.5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18899
 
Oval ID: oval:org.mitre.oval:def:18899
Title: TrueType Font CMAP Table Vulnerability (CVE-2013-3894) - MS13-081
Description: The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow remote attackers to execute arbitrary code via a crafted CMAP table in a TrueType font (TTF) file, aka "TrueType Font CMAP Table Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3894
Version: 3
Platform(s): Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Vista
Microsoft Windows XP
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18901
 
Oval ID: oval:org.mitre.oval:def:18901
Title: Remote code execution vulnerability in Microsoft Office for Mac 2011 (CVE-2013-3889) - MS13-085
Description: Microsoft Excel 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office for Mac 2011; Excel Viewer; Office Compatibility Pack SP3; and Excel Services and Word Automation Services in SharePoint Server 2013 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Excel Memory Corruption Vulnerability."
Family: macos Class: vulnerability
Reference(s): CVE-2013-3889
Version: 3
Platform(s): Apple Mac OS X
Apple Mac OS X Server
Product(s): Microsoft Office 2011 for Mac
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18909
 
Oval ID: oval:org.mitre.oval:def:18909
Title: Internet Explorer Memory Corruption Vulnerability (CVE-2013-3875) - MS13-080
Description: Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3875
Version: 5
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Product(s): Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18912
 
Oval ID: oval:org.mitre.oval:def:18912
Title: App Container Elevation of Privilege Vulnerability (CVE-2013-3880) - MS13-081
Description: The App Container feature in the kernel-mode drivers in Microsoft Windows 8, Windows Server 2012, and Windows RT allows remote attackers to bypass intended access restrictions and obtain sensitive information from a different container via a Trojan horse application, aka "App Container Elevation of Privilege Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3880
Version: 3
Platform(s): Microsoft Windows 8
Microsoft Windows Server 2012
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18924
 
Oval ID: oval:org.mitre.oval:def:18924
Title: DirectX Graphics Kernel Subsystem Double Fetch Vulnerability (CVE-2013-3888) - MS13-081
Description: dxgkrnl.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "DirectX Graphics Kernel Subsystem Double Fetch Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3888
Version: 4
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18926
 
Oval ID: oval:org.mitre.oval:def:18926
Title: Remote code execution vulnerability in Microsoft Excel (CVE-2013-3890) - MS13-085
Description: Microsoft Excel 2007 SP3, Excel Viewer, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Excel Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3890
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Vista
Microsoft Windows XP
Product(s): Microsoft Excel 2007
Microsoft Excel Viewer 2007
Microsoft Office Compatibility Pack
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18953
 
Oval ID: oval:org.mitre.oval:def:18953
Title: Memory Corruption Vulnerability (CVE-2013-3892) - MS13-086
Description: Microsoft Word 2007 SP3 and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3892
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Microsoft Office Compatibility Pack
Microsoft Word 2007
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18989
 
Oval ID: oval:org.mitre.oval:def:18989
Title: Internet Explorer Memory Corruption Vulnerability (CVE-2013-3897) - MS13-080
Description: Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript code that uses the onpropertychange event handler, as exploited in the wild in September and October 2013, aka "Internet Explorer Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3897
Version: 5
Platform(s): Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Vista
Microsoft Windows XP
Product(s): Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18991
 
Oval ID: oval:org.mitre.oval:def:18991
Title: Parameter injection vulnerability in Microsoft SharePoint (CVE-2013-3895) - MS13-084
Description: Microsoft SharePoint Server 2007 SP3 and 2010 SP1 and SP2 allows remote attackers to conduct clickjacking attacks via a crafted web page, aka "Parameter Injection Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3895
Version: 5
Platform(s): Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Vista
Microsoft Windows XP
Product(s): Microsoft SharePoint Server 2007
Microsoft SharePoint Services 3.0
Microsoft SharePoint Foundation 2010
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19003
 
Oval ID: oval:org.mitre.oval:def:19003
Title: Vulnerability in Silverlight Could Allow Information Disclosure (CVE-2013-3896) - MS13-087 (Mac OS X)
Description: Microsoft Silverlight 5 before 5.1.20913.0 does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application, aka "Silverlight Vulnerability."
Family: macos Class: vulnerability
Reference(s): CVE-2013-3896
Version: 3
Platform(s): Apple Mac OS X
Apple Mac OS X Server
Product(s): Microsoft Silverlight 5 for Mac
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19055
 
Oval ID: oval:org.mitre.oval:def:19055
Title: Vulnerability in Silverlight Could Allow Information Disclosure (CVE-2013-3896) - MS13-087
Description: Microsoft Silverlight 5 before 5.1.20913.0 does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application, aka "Silverlight Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3896
Version: 5
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Microsoft Silverlight 5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19060
 
Oval ID: oval:org.mitre.oval:def:19060
Title: Internet Explorer Memory Corruption Vulnerability (CVE-2013-3873) - MS13-080
Description: Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3882, and CVE-2013-3885.
Family: windows Class: vulnerability
Reference(s): CVE-2013-3873
Version: 5
Platform(s): Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product(s): Microsoft Internet Explorer 10
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19132
 
Oval ID: oval:org.mitre.oval:def:19132
Title: Microsoft Excel Memory Corruption Vulnerability (CVE-2013-3889) - MS13-084, MS13-085
Description: Microsoft Excel 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office for Mac 2011; Excel Viewer; Office Compatibility Pack SP3; and Excel Services and Word Automation Services in SharePoint Server 2013 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Excel Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3889
Version: 11
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Vista
Microsoft Windows XP
Product(s): Microsoft Excel 2007
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Excel Viewer 2007
Microsoft Office Web Apps 2010
Microsoft SharePoint Server 2007
Microsoft SharePoint Server 2010
Microsoft SharePoint Server 2013
Microsoft Office Compatibility Pack
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 6
Application 5
Application 1
Application 7
Application 5
Application 1
Application 1
Application 3
Application 4
Application 7
Application 2
Os 4
Os 4
Os 1
Os 4
Os 8
Os 1
Os 3
Os 4

SAINT Exploits

Description Link
Internet Explorer HTML Rendering Engine onLoseCapture Use-After-Free Vulnerability More info here
Internet Explorer CDisplayPointer Object onpropertychange Use-After-Free More info here

ExploitDB Exploits

id Description
2014-02-11 Windows TrackPopupMenuEx Win32k NULL Page
2013-10-15 MS13-080 Microsoft Internet Explorer CDisplayPointer Use-After-Free
2013-10-02 Micorosft Internet Explorer SetMouseCapture Use-After-Free

Information Assurance Vulnerability Management (IAVM)

Date Description
2013-12-12 IAVM : 2013-A-0232 - Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers
Severity : Category I - VMSKEY : V0042582
2013-10-10 IAVM : 2013-A-0187 - Multiple Vulnerabilities in Microsoft .NET Framework
Severity : Category I - VMSKEY : V0040753
2013-10-10 IAVM : 2013-B-0115 - Microsoft Office Word Remote Code Execution Vulnerabilities
Severity : Category II - VMSKEY : V0040756
2013-10-10 IAVM : 2013-B-0114 - Multiple Vulnerabilities in Microsoft Office Excel
Severity : Category II - VMSKEY : V0040757
2013-10-10 IAVM : 2013-A-0188 - Cumulative Security Update for Microsoft Internet Explorer
Severity : Category I - VMSKEY : V0040759
2013-10-10 IAVM : 2013-A-0189 - Microsoft Windows Common Control Library Remote Code Execution Vulnerability
Severity : Category II - VMSKEY : V0040760
2013-10-10 IAVM : 2013-A-0190 - Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers
Severity : Category I - VMSKEY : V0040763
2013-10-10 IAVM : 2013-B-0117 - Microsoft Silverlight Information Disclosure Vulnerability
Severity : Category II - VMSKEY : V0040764
2013-10-10 IAVM : 2013-B-0116 - Microsoft SharePoint Remote Code Execution Vulnerabilities
Severity : Category II - VMSKEY : V0040765

Snort® IPS/IDS

Date Description
2019-04-11 Microsoft Internet Explorer CAnchorElement use after free attempt
RuleID : 49375 - Revision : 1 - Type : BROWSER-IE
2019-04-11 Microsoft Internet Explorer CAnchorElement use after free attempt
RuleID : 49374 - Revision : 1 - Type : BROWSER-IE
2016-03-24 Microsoft Internet Explorer swapNode memory corruption attempt
RuleID : 37837 - Revision : 2 - Type : BROWSER-IE
2016-03-24 Microsoft Internet Explorer swapNode memory corruption attempt
RuleID : 37836 - Revision : 2 - Type : BROWSER-IE
2015-03-31 Microsoft Internet Explorer CAnchorElement use after free attempt
RuleID : 33606 - Revision : 3 - Type : BROWSER-IE
2015-03-31 Microsoft Internet Explorer CAnchorElement use after free attempt
RuleID : 33605 - Revision : 3 - Type : BROWSER-IE
2014-05-01 Microsoft Internet Explorer HtmlLayout SmartObject use after free attempt
RuleID : 30289 - Revision : 3 - Type : BROWSER-IE
2014-04-24 ATMFD Adobe font driver reserved command denial of service attempt
RuleID : 30241 - Revision : 2 - Type : FILE-OTHER
2014-04-24 ATMFD Adobe font driver reserved command denial of service attempt
RuleID : 30240 - Revision : 2 - Type : FILE-OTHER
2014-04-10 Microsoft Internet Explorer CAnchorElement use after free attempt
RuleID : 30105 - Revision : 3 - Type : BROWSER-IE
2014-04-10 Microsoft Internet Explorer CAnchorElement use after free attempt
RuleID : 30104 - Revision : 3 - Type : BROWSER-IE
2014-04-10 Microsoft Internet Explorer CAnchorElement use after free attempt
RuleID : 30103 - Revision : 3 - Type : BROWSER-IE
2014-04-10 Microsoft Internet Explorer CAnchorElement use after free attempt
RuleID : 30102 - Revision : 3 - Type : BROWSER-IE
2014-02-08 potential math library debugging
RuleID : 29213 - Revision : 5 - Type : INDICATOR-OBFUSCATION
2014-01-30 Angler exploit kit XORed payload download attempt
RuleID : 29066 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Angler exploit kit payload download attempt
RuleID : 28616 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Angler exploit kit exploit download attempt
RuleID : 28615 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Angler exploit kit landing page
RuleID : 28614 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Angler exploit kit landing page - specific-structure
RuleID : 28613 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Multiple exploit kit Silverlight exploit download
RuleID : 28612 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Microsoft Internet Explorer swapNode memory corruption attempt
RuleID : 28208 - Revision : 9 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer swapNode memory corruption attempt
RuleID : 28207 - Revision : 9 - Type : BROWSER-IE
2014-01-10 Microsoft Office Word 2003 macro byte opcode large data structure arbitrary c...
RuleID : 28206 - Revision : 3 - Type : FILE-OFFICE
2014-01-10 Microsoft Office Word 2003 macro byte opcode large data structure arbitrary c...
RuleID : 28205 - Revision : 3 - Type : FILE-OFFICE
2014-01-10 Microsoft Internet Explorer deleted object memory corruption attempt
RuleID : 28204 - Revision : 2 - Type : BROWSER-IE
2014-01-10 ATMFD Adobe font driver reserved command denial of service attempt
RuleID : 28203 - Revision : 4 - Type : FILE-OTHER
2014-01-10 ATMFD Adobe font driver reserved command denial of service attempt
RuleID : 28202 - Revision : 3 - Type : FILE-OTHER
2014-01-10 Microsoft SharePoint XSS attempt
RuleID : 28201 - Revision : 3 - Type : SERVER-OTHER
2014-01-10 Microsoft Internet Explorer HtmlLayout SmartObject use after free attempt
RuleID : 28163 - Revision : 4 - Type : BROWSER-IE
2014-01-10 Microsoft .NET XML digital signature denial of service attempt
RuleID : 28162 - Revision : 4 - Type : FILE-OTHER
2014-01-10 Microsoft .NET XML digital signature denial of service attempt
RuleID : 28161 - Revision : 4 - Type : FILE-OTHER
2014-01-10 Microsoft Internet Explorer CElement use after free attempt
RuleID : 28160 - Revision : 2 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer CLayoutBlock use after free attempt
RuleID : 28159 - Revision : 2 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer CLayoutBlock use after free attempt
RuleID : 28158 - Revision : 2 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer STextBlockPosition use after free attempt
RuleID : 28151 - Revision : 3 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer onlosecapture memory corruption attempt
RuleID : 27944 - Revision : 11 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer onlosecapture memory corruption attempt
RuleID : 27943 - Revision : 10 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

Date Description
2013-10-09 Name : An application installed on the remote Mac OS X host is affected by a remote ...
File : macosx_ms13-085.nasl - Type : ACT_GATHER_INFO
2013-10-09 Name : A multimedia application framework installed on the remote Mac OS X host is a...
File : macosx_ms13-087.nasl - Type : ACT_GATHER_INFO
2013-10-09 Name : The remote host is affected by multiple code execution vulnerabilities.
File : smb_nt_ms13-080.nasl - Type : ACT_GATHER_INFO
2013-10-09 Name : The Windows kernel drivers on the remote host are affected by multiple vulner...
File : smb_nt_ms13-081.nasl - Type : ACT_GATHER_INFO
2013-10-09 Name : The .NET Framework install on the remote Windows host could allow arbitrary c...
File : smb_nt_ms13-082.nasl - Type : ACT_GATHER_INFO
2013-10-09 Name : A library on the remote Windows host has an integer overflow vulnerability.
File : smb_nt_ms13-083.nasl - Type : ACT_GATHER_INFO
2013-10-09 Name : The remote host is affected by multiple vulnerabilities.
File : smb_nt_ms13-084.nasl - Type : ACT_GATHER_INFO
2013-10-09 Name : The Microsoft Office component installed on the remote host is affected by mu...
File : smb_nt_ms13-085.nasl - Type : ACT_GATHER_INFO
2013-10-09 Name : The Microsoft Office component installed on the remote host is affected by mu...
File : smb_nt_ms13-086.nasl - Type : ACT_GATHER_INFO
2013-10-09 Name : A browser enhancement on the remote Windows host is affected by an informatio...
File : smb_nt_ms13-087.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2013-12-20 13:23:55
  • Multiple Updates
2013-10-16 00:18:43
  • First insertion