Executive Summary
Informations | |||
---|---|---|---|
Name | TA13-288A | First vendor Publication | 2013-10-15 |
Vendor | US-CERT | Last vendor Modification | 2013-10-15 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Overview Select Microsoft software products contain multiple vulnerabilities. Microsoft has released updates to address these vulnerabilities.
DescriptionThe Microsoft Security Bulletin Summary for October 2013 describes multiple vulnerabilities in Microsoft software. Microsoft has released updates to address these vulnerabilities. ImpactThese vulnerabilities could allow remote code execution or information disclosure.
SolutionApply Updates Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for October 2013, which describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS). Home users are encouraged to enable automatic updates.
|
Original Source
Url : http://www.us-cert.gov/cas/techalerts/TA13-288A.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
43 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
22 % | CWE-399 | Resource Management Errors |
13 % | CWE-20 | Improper Input Validation |
9 % | CWE-264 | Permissions, Privileges, and Access Controls |
9 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
4 % | CWE-416 | Use After Free |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18366 | |||
Oval ID: | oval:org.mitre.oval:def:18366 | ||
Title: | Internet Explorer Memory Corruption Vulnerability (CVE-2013-3882) - MS13-080 | ||
Description: | Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3873, and CVE-2013-3885. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3882 | Version: | 6 |
Platform(s): | Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Microsoft Internet Explorer 10 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18517 | |||
Oval ID: | oval:org.mitre.oval:def:18517 | ||
Title: | Entity Expansion Vulnerability (CVE-2013-3860) - MS13-082 | ||
Description: | Microsoft .NET Framework 2.0 SP2, 3.5, 3.5 SP1, 3.5.1, 4, and 4.5 does not properly parse a DTD during XML digital-signature validation, which allows remote attackers to cause a denial of service (application crash or hang) via a crafted signed XML document, aka "Entity Expansion Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3860 | Version: | 10 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP Microsoft Windows 8 Microsoft Windows Server 2012 | Product(s): | Microsoft .NET Framework 2.0 Microsoft .NET Framework 3.5 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.0 Microsoft .NET Framework 4.5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18601 | |||
Oval ID: | oval:org.mitre.oval:def:18601 | ||
Title: | Internet Explorer Memory Corruption Vulnerability (CVE-2013-3872) - MS13-080 | ||
Description: | Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3873, CVE-2013-3882, and CVE-2013-3885. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3872 | Version: | 6 |
Platform(s): | Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Microsoft Internet Explorer 10 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18614 | |||
Oval ID: | oval:org.mitre.oval:def:18614 | ||
Title: | Win32k NULL Page Vulnerability (CVE-2013-3881) - MS13-081 | ||
Description: | win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges via a crafted application, aka "Win32k NULL Page Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3881 | Version: | 4 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 R2 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18630 | |||
Oval ID: | oval:org.mitre.oval:def:18630 | ||
Title: | Windows USB Descriptor Vulnerability (CVE-2013-3200) - MS13-081 | ||
Description: | The USB drivers in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3200 | Version: | 6 |
Platform(s): | Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Vista Microsoft Windows XP | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18643 | |||
Oval ID: | oval:org.mitre.oval:def:18643 | ||
Title: | Memory Corruption Vulnerability (CVE-2013-3891) - MS13-086 | ||
Description: | Microsoft Word 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3891 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2012 | Product(s): | Microsoft Word 2003 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18665 | |||
Oval ID: | oval:org.mitre.oval:def:18665 | ||
Title: | Internet Explorer Memory Corruption Vulnerability (CVE-2013-3893) - MS13-080 | ||
Description: | Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3893 | Version: | 6 |
Platform(s): | Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Vista Microsoft Windows XP | Product(s): | Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 Microsoft Internet Explorer 10 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18715 | |||
Oval ID: | oval:org.mitre.oval:def:18715 | ||
Title: | Vulnerability in Windows Common Control Library Could Allow Remote Code Execution (CVE-2013-3195) - MS13-083 | ||
Description: | The DSA_InsertItem function in Comctl32.dll in the Windows common control library in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly allocate memory, which allows remote attackers to execute arbitrary code via a crafted value in an argument to an ASP.NET web application, aka "Comctl32 Integer Overflow Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3195 | Version: | 4 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2012 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18718 | |||
Oval ID: | oval:org.mitre.oval:def:18718 | ||
Title: | Win32k Use After Free Vulnerability (CVE-2013-3879) MS13-081 | ||
Description: | Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3879 | Version: | 4 |
Platform(s): | Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Vista Microsoft Windows XP | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18793 | |||
Oval ID: | oval:org.mitre.oval:def:18793 | ||
Title: | Internet Explorer Memory Corruption Vulnerability (CVE-2013-3874) - MS13-080 | ||
Description: | Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3874 | Version: | 5 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista | Product(s): | Microsoft Internet Explorer 9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18811 | |||
Oval ID: | oval:org.mitre.oval:def:18811 | ||
Title: | Internet Explorer Memory Corruption Vulnerability (CVE-2013-3886) - MS13-080 | ||
Description: | Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3886 | Version: | 5 |
Platform(s): | Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Vista | Product(s): | Microsoft Internet Explorer 9 Microsoft Internet Explorer 10 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18817 | |||
Oval ID: | oval:org.mitre.oval:def:18817 | ||
Title: | Internet Explorer Memory Corruption Vulnerability (CVE-2013-3885) - MS13-080 | ||
Description: | Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3873, and CVE-2013-3882. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3885 | Version: | 5 |
Platform(s): | Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Microsoft Internet Explorer 10 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18847 | |||
Oval ID: | oval:org.mitre.oval:def:18847 | ||
Title: | OpenType Font Parsing Vulnerability (CVE-2013-3128) - MS13-081, MS13-082 | ||
Description: | The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5, allow remote attackers to execute arbitrary code via a crafted OpenType font (OTF) file, aka "OpenType Font Parsing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3128 | Version: | 14 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP Microsoft Windows 8 Microsoft Windows Server 2012 | Product(s): | Microsoft .NET Framework 3.0 Microsoft .NET Framework 3.5 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.0 Microsoft .NET Framework 4.5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18899 | |||
Oval ID: | oval:org.mitre.oval:def:18899 | ||
Title: | TrueType Font CMAP Table Vulnerability (CVE-2013-3894) - MS13-081 | ||
Description: | The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow remote attackers to execute arbitrary code via a crafted CMAP table in a TrueType font (TTF) file, aka "TrueType Font CMAP Table Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3894 | Version: | 3 |
Platform(s): | Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Vista Microsoft Windows XP | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18901 | |||
Oval ID: | oval:org.mitre.oval:def:18901 | ||
Title: | Remote code execution vulnerability in Microsoft Office for Mac 2011 (CVE-2013-3889) - MS13-085 | ||
Description: | Microsoft Excel 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office for Mac 2011; Excel Viewer; Office Compatibility Pack SP3; and Excel Services and Word Automation Services in SharePoint Server 2013 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Excel Memory Corruption Vulnerability." | ||
Family: | macos | Class: | vulnerability |
Reference(s): | CVE-2013-3889 | Version: | 3 |
Platform(s): | Apple Mac OS X Apple Mac OS X Server | Product(s): | Microsoft Office 2011 for Mac |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18909 | |||
Oval ID: | oval:org.mitre.oval:def:18909 | ||
Title: | Internet Explorer Memory Corruption Vulnerability (CVE-2013-3875) - MS13-080 | ||
Description: | Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3875 | Version: | 5 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP | Product(s): | Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18912 | |||
Oval ID: | oval:org.mitre.oval:def:18912 | ||
Title: | App Container Elevation of Privilege Vulnerability (CVE-2013-3880) - MS13-081 | ||
Description: | The App Container feature in the kernel-mode drivers in Microsoft Windows 8, Windows Server 2012, and Windows RT allows remote attackers to bypass intended access restrictions and obtain sensitive information from a different container via a Trojan horse application, aka "App Container Elevation of Privilege Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3880 | Version: | 3 |
Platform(s): | Microsoft Windows 8 Microsoft Windows Server 2012 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18924 | |||
Oval ID: | oval:org.mitre.oval:def:18924 | ||
Title: | DirectX Graphics Kernel Subsystem Double Fetch Vulnerability (CVE-2013-3888) - MS13-081 | ||
Description: | dxgkrnl.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "DirectX Graphics Kernel Subsystem Double Fetch Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3888 | Version: | 4 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18926 | |||
Oval ID: | oval:org.mitre.oval:def:18926 | ||
Title: | Remote code execution vulnerability in Microsoft Excel (CVE-2013-3890) - MS13-085 | ||
Description: | Microsoft Excel 2007 SP3, Excel Viewer, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Excel Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3890 | Version: | 5 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Vista Microsoft Windows XP | Product(s): | Microsoft Excel 2007 Microsoft Excel Viewer 2007 Microsoft Office Compatibility Pack |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18953 | |||
Oval ID: | oval:org.mitre.oval:def:18953 | ||
Title: | Memory Corruption Vulnerability (CVE-2013-3892) - MS13-086 | ||
Description: | Microsoft Word 2007 SP3 and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3892 | Version: | 5 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2012 | Product(s): | Microsoft Office Compatibility Pack Microsoft Word 2007 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18989 | |||
Oval ID: | oval:org.mitre.oval:def:18989 | ||
Title: | Internet Explorer Memory Corruption Vulnerability (CVE-2013-3897) - MS13-080 | ||
Description: | Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript code that uses the onpropertychange event handler, as exploited in the wild in September and October 2013, aka "Internet Explorer Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3897 | Version: | 5 |
Platform(s): | Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Vista Microsoft Windows XP | Product(s): | Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 Microsoft Internet Explorer 10 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18991 | |||
Oval ID: | oval:org.mitre.oval:def:18991 | ||
Title: | Parameter injection vulnerability in Microsoft SharePoint (CVE-2013-3895) - MS13-084 | ||
Description: | Microsoft SharePoint Server 2007 SP3 and 2010 SP1 and SP2 allows remote attackers to conduct clickjacking attacks via a crafted web page, aka "Parameter Injection Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3895 | Version: | 5 |
Platform(s): | Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Vista Microsoft Windows XP | Product(s): | Microsoft SharePoint Server 2007 Microsoft SharePoint Services 3.0 Microsoft SharePoint Foundation 2010 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19003 | |||
Oval ID: | oval:org.mitre.oval:def:19003 | ||
Title: | Vulnerability in Silverlight Could Allow Information Disclosure (CVE-2013-3896) - MS13-087 (Mac OS X) | ||
Description: | Microsoft Silverlight 5 before 5.1.20913.0 does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application, aka "Silverlight Vulnerability." | ||
Family: | macos | Class: | vulnerability |
Reference(s): | CVE-2013-3896 | Version: | 3 |
Platform(s): | Apple Mac OS X Apple Mac OS X Server | Product(s): | Microsoft Silverlight 5 for Mac |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19055 | |||
Oval ID: | oval:org.mitre.oval:def:19055 | ||
Title: | Vulnerability in Silverlight Could Allow Information Disclosure (CVE-2013-3896) - MS13-087 | ||
Description: | Microsoft Silverlight 5 before 5.1.20913.0 does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application, aka "Silverlight Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3896 | Version: | 5 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP Microsoft Windows 8 Microsoft Windows Server 2012 | Product(s): | Microsoft Silverlight 5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19060 | |||
Oval ID: | oval:org.mitre.oval:def:19060 | ||
Title: | Internet Explorer Memory Corruption Vulnerability (CVE-2013-3873) - MS13-080 | ||
Description: | Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3882, and CVE-2013-3885. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3873 | Version: | 5 |
Platform(s): | Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | Microsoft Internet Explorer 10 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19132 | |||
Oval ID: | oval:org.mitre.oval:def:19132 | ||
Title: | Microsoft Excel Memory Corruption Vulnerability (CVE-2013-3889) - MS13-084, MS13-085 | ||
Description: | Microsoft Excel 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office for Mac 2011; Excel Viewer; Office Compatibility Pack SP3; and Excel Services and Word Automation Services in SharePoint Server 2013 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Excel Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3889 | Version: | 11 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Vista Microsoft Windows XP | Product(s): | Microsoft Excel 2007 Microsoft Excel 2010 Microsoft Excel 2013 Microsoft Office 2007 Microsoft Office 2010 Microsoft Office 2013 Microsoft Excel Viewer 2007 Microsoft Office Web Apps 2010 Microsoft SharePoint Server 2007 Microsoft SharePoint Server 2010 Microsoft SharePoint Server 2013 Microsoft Office Compatibility Pack |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Internet Explorer HTML Rendering Engine onLoseCapture Use-After-Free Vulnerability | More info here |
Internet Explorer CDisplayPointer Object onpropertychange Use-After-Free | More info here |
ExploitDB Exploits
id | Description |
---|---|
2014-02-11 | Windows TrackPopupMenuEx Win32k NULL Page |
2013-10-15 | MS13-080 Microsoft Internet Explorer CDisplayPointer Use-After-Free |
2013-10-02 | Micorosft Internet Explorer SetMouseCapture Use-After-Free |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2013-12-12 | IAVM : 2013-A-0232 - Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers Severity : Category I - VMSKEY : V0042582 |
2013-10-10 | IAVM : 2013-A-0187 - Multiple Vulnerabilities in Microsoft .NET Framework Severity : Category I - VMSKEY : V0040753 |
2013-10-10 | IAVM : 2013-B-0115 - Microsoft Office Word Remote Code Execution Vulnerabilities Severity : Category II - VMSKEY : V0040756 |
2013-10-10 | IAVM : 2013-B-0114 - Multiple Vulnerabilities in Microsoft Office Excel Severity : Category II - VMSKEY : V0040757 |
2013-10-10 | IAVM : 2013-A-0188 - Cumulative Security Update for Microsoft Internet Explorer Severity : Category I - VMSKEY : V0040759 |
2013-10-10 | IAVM : 2013-A-0189 - Microsoft Windows Common Control Library Remote Code Execution Vulnerability Severity : Category II - VMSKEY : V0040760 |
2013-10-10 | IAVM : 2013-A-0190 - Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers Severity : Category I - VMSKEY : V0040763 |
2013-10-10 | IAVM : 2013-B-0117 - Microsoft Silverlight Information Disclosure Vulnerability Severity : Category II - VMSKEY : V0040764 |
2013-10-10 | IAVM : 2013-B-0116 - Microsoft SharePoint Remote Code Execution Vulnerabilities Severity : Category II - VMSKEY : V0040765 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-04-11 | Microsoft Internet Explorer CAnchorElement use after free attempt RuleID : 49375 - Revision : 1 - Type : BROWSER-IE |
2019-04-11 | Microsoft Internet Explorer CAnchorElement use after free attempt RuleID : 49374 - Revision : 1 - Type : BROWSER-IE |
2016-03-24 | Microsoft Internet Explorer swapNode memory corruption attempt RuleID : 37837 - Revision : 2 - Type : BROWSER-IE |
2016-03-24 | Microsoft Internet Explorer swapNode memory corruption attempt RuleID : 37836 - Revision : 2 - Type : BROWSER-IE |
2015-03-31 | Microsoft Internet Explorer CAnchorElement use after free attempt RuleID : 33606 - Revision : 3 - Type : BROWSER-IE |
2015-03-31 | Microsoft Internet Explorer CAnchorElement use after free attempt RuleID : 33605 - Revision : 3 - Type : BROWSER-IE |
2014-05-01 | Microsoft Internet Explorer HtmlLayout SmartObject use after free attempt RuleID : 30289 - Revision : 3 - Type : BROWSER-IE |
2014-04-24 | ATMFD Adobe font driver reserved command denial of service attempt RuleID : 30241 - Revision : 2 - Type : FILE-OTHER |
2014-04-24 | ATMFD Adobe font driver reserved command denial of service attempt RuleID : 30240 - Revision : 2 - Type : FILE-OTHER |
2014-04-10 | Microsoft Internet Explorer CAnchorElement use after free attempt RuleID : 30105 - Revision : 3 - Type : BROWSER-IE |
2014-04-10 | Microsoft Internet Explorer CAnchorElement use after free attempt RuleID : 30104 - Revision : 3 - Type : BROWSER-IE |
2014-04-10 | Microsoft Internet Explorer CAnchorElement use after free attempt RuleID : 30103 - Revision : 3 - Type : BROWSER-IE |
2014-04-10 | Microsoft Internet Explorer CAnchorElement use after free attempt RuleID : 30102 - Revision : 3 - Type : BROWSER-IE |
2014-02-08 | potential math library debugging RuleID : 29213 - Revision : 5 - Type : INDICATOR-OBFUSCATION |
2014-01-30 | Angler exploit kit XORed payload download attempt RuleID : 29066 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Angler exploit kit payload download attempt RuleID : 28616 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Angler exploit kit exploit download attempt RuleID : 28615 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Angler exploit kit landing page RuleID : 28614 - Revision : 3 - Type : EXPLOIT-KIT |
2014-01-10 | Angler exploit kit landing page - specific-structure RuleID : 28613 - Revision : 3 - Type : EXPLOIT-KIT |
2014-01-10 | Multiple exploit kit Silverlight exploit download RuleID : 28612 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Microsoft Internet Explorer swapNode memory corruption attempt RuleID : 28208 - Revision : 9 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer swapNode memory corruption attempt RuleID : 28207 - Revision : 9 - Type : BROWSER-IE |
2014-01-10 | Microsoft Office Word 2003 macro byte opcode large data structure arbitrary c... RuleID : 28206 - Revision : 3 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word 2003 macro byte opcode large data structure arbitrary c... RuleID : 28205 - Revision : 3 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Internet Explorer deleted object memory corruption attempt RuleID : 28204 - Revision : 2 - Type : BROWSER-IE |
2014-01-10 | ATMFD Adobe font driver reserved command denial of service attempt RuleID : 28203 - Revision : 4 - Type : FILE-OTHER |
2014-01-10 | ATMFD Adobe font driver reserved command denial of service attempt RuleID : 28202 - Revision : 3 - Type : FILE-OTHER |
2014-01-10 | Microsoft SharePoint XSS attempt RuleID : 28201 - Revision : 3 - Type : SERVER-OTHER |
2014-01-10 | Microsoft Internet Explorer HtmlLayout SmartObject use after free attempt RuleID : 28163 - Revision : 4 - Type : BROWSER-IE |
2014-01-10 | Microsoft .NET XML digital signature denial of service attempt RuleID : 28162 - Revision : 4 - Type : FILE-OTHER |
2014-01-10 | Microsoft .NET XML digital signature denial of service attempt RuleID : 28161 - Revision : 4 - Type : FILE-OTHER |
2014-01-10 | Microsoft Internet Explorer CElement use after free attempt RuleID : 28160 - Revision : 2 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer CLayoutBlock use after free attempt RuleID : 28159 - Revision : 2 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer CLayoutBlock use after free attempt RuleID : 28158 - Revision : 2 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer STextBlockPosition use after free attempt RuleID : 28151 - Revision : 3 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer onlosecapture memory corruption attempt RuleID : 27944 - Revision : 11 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer onlosecapture memory corruption attempt RuleID : 27943 - Revision : 10 - Type : BROWSER-IE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-10-09 | Name : An application installed on the remote Mac OS X host is affected by a remote ... File : macosx_ms13-085.nasl - Type : ACT_GATHER_INFO |
2013-10-09 | Name : A multimedia application framework installed on the remote Mac OS X host is a... File : macosx_ms13-087.nasl - Type : ACT_GATHER_INFO |
2013-10-09 | Name : The remote host is affected by multiple code execution vulnerabilities. File : smb_nt_ms13-080.nasl - Type : ACT_GATHER_INFO |
2013-10-09 | Name : The Windows kernel drivers on the remote host are affected by multiple vulner... File : smb_nt_ms13-081.nasl - Type : ACT_GATHER_INFO |
2013-10-09 | Name : The .NET Framework install on the remote Windows host could allow arbitrary c... File : smb_nt_ms13-082.nasl - Type : ACT_GATHER_INFO |
2013-10-09 | Name : A library on the remote Windows host has an integer overflow vulnerability. File : smb_nt_ms13-083.nasl - Type : ACT_GATHER_INFO |
2013-10-09 | Name : The remote host is affected by multiple vulnerabilities. File : smb_nt_ms13-084.nasl - Type : ACT_GATHER_INFO |
2013-10-09 | Name : The Microsoft Office component installed on the remote host is affected by mu... File : smb_nt_ms13-085.nasl - Type : ACT_GATHER_INFO |
2013-10-09 | Name : The Microsoft Office component installed on the remote host is affected by mu... File : smb_nt_ms13-086.nasl - Type : ACT_GATHER_INFO |
2013-10-09 | Name : A browser enhancement on the remote Windows host is affected by an informatio... File : smb_nt_ms13-087.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2013-12-20 13:23:55 |
|
2013-10-16 00:18:43 |
|