MS13-082: Vulnerabilities in .NET Framework Could Allow Remote Code Execution (2878890)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The .NET Framework install on the remote Windows host could allow
arbitrary code execution.

Description :

The version of the .NET Framework installed on the remote host is
reportedly affected by the following vulnerabilities :

- A vulnerability exists in the way that affected
components handle specially crafted OpenType fonts
(OTF) that could lead to remote code execution. An
attacker could leverage this issue by enticing a user
to visit a web page containing a specially crafted OTF
font file. (CVE-2013-3128)

- The .NET Framework is affected by a denial of service
vulnerability when parsing a specially crafted document
type definition (DTD) for XML data. (CVE-2013-3860)

- The .NET Framework is affected by a denial of service
vulnerability when parsing specially crafted
JavaScript Object Notation (JSON) data. (CVE-2013-3861)

See also :

http://technet.microsoft.com/en-us/security/bulletin/ms13-082

Solution :

Microsoft has released a set of patches for .NET Framework 2.0, 3.0,
3.5, 3.5.1, 4.0, and 4.5.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 70334 ()

Bugtraq ID: 62807
62819
62820

CVE ID: CVE-2013-3128
CVE-2013-3860
CVE-2013-3861