MS13-052: Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution (2861561)

High Nessus Plugin ID 67209

Synopsis

The .NET Framework install on the remote Windows host could allow arbitrary code execution.

Description

The version of the .NET Framework installed on the remote host is reportedly affected by the following vulnerabilities :

- A vulnerability exists in the way that affected components handle specially crafted TrueType font files that could lead to remote code execution. An attacker could leverage this issue by enticing a user to open a specially crafted TrueType font file.
(CVE-2013-3129)

- The .NET Framework does not properly handle multidimensional arrays of small structures, which could lead to remote code execution. (CVE-2013-3131)

- The .NET Framework does not properly validate the permissions of certain objects performing reflection.
This could allow an attacker to elevate their privileges and take complete control of the system.
(CVE-2013-3132)

- The .NET Framework does not properly validate the permissions of objects involved with reflection, which could lead to an elevation of privileges.
(CVE-2013-3133)

- The .NET Framework is affected by a remote code execution vulnerability due to the way in which it allocates arrays of small structures. (CVE-2013-3134)

- The .NET Framework does not properly validate the permissions for delegate objects during serialization, which could lead to an elevation of privileges.
(CVE-2013-3171)

- Microsoft Silverlight does not properly handle null pointers, which could lead to remote code execution.
(CVE-2013-3178)

An attacker may be able to leverage these vulnerabilities to execute arbitrary code on the affected system if a user can be tricked into viewing a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications.

Solution

Microsoft has released a set of patches for .NET Framework 1.0, 1.1, 2.0, 3.0, 3.5, 3.5.1, 4.0, and 4.5 as well as Silverlight 5.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2013/ms13-052

Plugin Details

Severity: High

ID: 67209

File Name: smb_nt_ms13-052.nasl

Version: 1.12

Type: local

Agent: windows

Published: 2013/07/10

Updated: 2018/11/15

Dependencies: 57033, 13855, 42399

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows, cpe:/a:microsoft:silverlight, cpe:/a:microsoft:.net_framework

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/07/09

Vulnerability Publication Date: 2013/07/09

Reference Information

CVE: CVE-2013-3129, CVE-2013-3131, CVE-2013-3132, CVE-2013-3133, CVE-2013-3134, CVE-2013-3171, CVE-2013-3178

BID: 60932, 60933, 60934, 60935, 60937, 60938, 60978