MS13-052: Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution (2861561)

high Nessus Plugin ID 67209
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The .NET Framework install on the remote Windows host could allow arbitrary code execution.

Description

The version of the .NET Framework installed on the remote host is reportedly affected by the following vulnerabilities :

- A vulnerability exists in the way that affected components handle specially crafted TrueType font files that could lead to remote code execution. An attacker could leverage this issue by enticing a user to open a specially crafted TrueType font file.
(CVE-2013-3129)

- The .NET Framework does not properly handle multidimensional arrays of small structures, which could lead to remote code execution. (CVE-2013-3131)

- The .NET Framework does not properly validate the permissions of certain objects performing reflection.
This could allow an attacker to elevate their privileges and take complete control of the system.
(CVE-2013-3132)

- The .NET Framework does not properly validate the permissions of objects involved with reflection, which could lead to an elevation of privileges.
(CVE-2013-3133)

- The .NET Framework is affected by a remote code execution vulnerability due to the way in which it allocates arrays of small structures. (CVE-2013-3134)

- The .NET Framework does not properly validate the permissions for delegate objects during serialization, which could lead to an elevation of privileges.
(CVE-2013-3171)

- Microsoft Silverlight does not properly handle null pointers, which could lead to remote code execution.
(CVE-2013-3178)

An attacker may be able to leverage these vulnerabilities to execute arbitrary code on the affected system if a user can be tricked into viewing a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications.

Solution

Microsoft has released a set of patches for .NET Framework 1.0, 1.1, 2.0, 3.0, 3.5, 3.5.1, 4.0, and 4.5 as well as Silverlight 5.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2013/ms13-052

Plugin Details

Severity: High

ID: 67209

File Name: smb_nt_ms13-052.nasl

Version: 1.12

Type: local

Agent: windows

Published: 7/10/2013

Updated: 11/15/2018

Dependencies: smb_hotfixes.nasl, silverlight_detect.nasl, ms_bulletin_checks_possible.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows, cpe:/a:microsoft:silverlight, cpe:/a:microsoft:.net_framework

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 7/9/2013

Vulnerability Publication Date: 7/9/2013

Reference Information

CVE: CVE-2013-3129, CVE-2013-3131, CVE-2013-3132, CVE-2013-3133, CVE-2013-3134, CVE-2013-3171, CVE-2013-3178

BID: 60932, 60933, 60934, 60935, 60937, 60938, 60978