MS13-006: Vulnerability in Microsoft Windows Could Allow Security Feature Bypass (2785220) (uncredentialed check)

Medium Nessus Plugin ID 63643


The remote host is affected by a security feature bypass vulnerability.


The remote host contains a flaw in the handling of SSL version 3 (SSLv3) and TLS (Transport Layer Security) protocols. An attacker can inject specially crafted content into an SSL/TLS session, which could allow an attacker to bypass security features of SSLv3 and TLS protocols in order to intercept communications.

Note that this plugin only tests Microsoft IIS HTTPS and TLS-capable FTP servers, which are known to use MS13-006 update files. Other SSL/TLS implementations may also be affected. To test all SSL/TLS services Nessus finds, configure the 'Report paranoia' preference setting to 'Paranoid (more false alarms).'


Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, and 2012.

For other SSL/TLS implementations, contact the vendor for updates.

See Also

Plugin Details

Severity: Medium

ID: 63643

File Name: ms13-006_ssl.nbin

Version: $Revision: 1.73 $

Type: remote

Agent: windows

Family: Windows

Published: 2013/01/22

Modified: 2018/02/15

Dependencies: 10107, 56984, 11936

Risk Information

Risk Factor: Medium


Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/01/08

Vulnerability Publication Date: 2013/01/08

Reference Information

CVE: CVE-2013-0013

BID: 57144

OSVDB: 88967

MSFT: MS13-006

IAVB: 2013-B-0003

MSKB: 2785220