MS13-063: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2859537)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The Windows kernel on the remote host is affected by multiple
vulnerabilities.

Description :

The Windows version installed on the remote host is affected by
multiple vulnerabilities :

- The Windows kernel is affected by multiple privilege
escalation vulnerabilities due to a memory corruption
condition in the NT Virtual DOS Machine (NTVDM). An
attacker who successfully exploited these issues could
run arbitrary code in kernel mode.
(CVE-2013-3196, CVE-2013-3197, CVE-2013-3198)

- A vulnerability exists in a security feature of Windows
due to the improper implementation of Address Space
Layout Randomization (ASLR). An attacker could bypass
the ASLR security feature to load a malicious DLL.
(CVE-2013-2556)

See also :

http://www.zerodayinitiative.com/advisories/ZDI-13-192/
http://www.securityfocus.com/archive/1/528339/30/0/threaded
http://technet.microsoft.com/en-us/security/Bulletin/MS13-063

Solution :

Microsoft has released a set of patches for Windows XP, 2003, Vista,
2008, 7, 2008 R2, and 8.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 5.3
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 69328 ()

Bugtraq ID: 58566
61682
61683
61684

CVE ID: CVE-2013-2556
CVE-2013-3196
CVE-2013-3197
CVE-2013-3198