MS13-063: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2859537)

high Nessus Plugin ID 69328

Synopsis

The Windows kernel on the remote host is affected by multiple vulnerabilities.

Description

The Windows version installed on the remote host is affected by multiple vulnerabilities :

- The Windows kernel is affected by multiple privilege escalation vulnerabilities due to a memory corruption condition in the NT Virtual DOS Machine (NTVDM). An attacker who successfully exploited these issues could run arbitrary code in kernel mode.
(CVE-2013-3196, CVE-2013-3197, CVE-2013-3198)

- A vulnerability exists in a security feature of Windows due to the improper implementation of Address Space Layout Randomization (ASLR). An attacker could bypass the ASLR security feature to load a malicious DLL.
(CVE-2013-2556)

Solution

Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, 2008 R2, and 8.

See Also

https://www.zerodayinitiative.com/advisories/ZDI-13-192/

https://www.securityfocus.com/archive/1/528339/30/0/threaded

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2013/ms13-063

Plugin Details

Severity: High

ID: 69328

File Name: smb_nt_ms13-063.nasl

Version: 1.14

Type: local

Agent: windows

Published: 8/14/2013

Updated: 6/3/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2013-2556

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 8/13/2013

Vulnerability Publication Date: 3/7/2013

Reference Information

CVE: CVE-2013-2556, CVE-2013-3196, CVE-2013-3197, CVE-2013-3198

BID: 58566, 61682, 61683, 61684

IAVB: 2013-B-0088-S

MSFT: MS13-063

MSKB: 2859537