MS13-063: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2859537)

High Nessus Plugin ID 69328


The Windows kernel on the remote host is affected by multiple vulnerabilities.


The Windows version installed on the remote host is affected by multiple vulnerabilities :

- The Windows kernel is affected by multiple privilege escalation vulnerabilities due to a memory corruption condition in the NT Virtual DOS Machine (NTVDM). An attacker who successfully exploited these issues could run arbitrary code in kernel mode.
(CVE-2013-3196, CVE-2013-3197, CVE-2013-3198)

- A vulnerability exists in a security feature of Windows due to the improper implementation of Address Space Layout Randomization (ASLR). An attacker could bypass the ASLR security feature to load a malicious DLL.


Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, 2008 R2, and 8.

See Also

Plugin Details

Severity: High

ID: 69328

File Name: smb_nt_ms13-063.nasl

Version: $Revision: 1.10 $

Type: local

Agent: windows

Published: 2013/08/14

Modified: 2017/07/26

Dependencies: 57033, 13855

Risk Information

Risk Factor: High


Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/08/13

Vulnerability Publication Date: 2013/03/07

Reference Information

CVE: CVE-2013-2556, CVE-2013-3196, CVE-2013-3197, CVE-2013-3198

BID: 58566, 61682, 61683, 61684

OSVDB: 91195, 96178, 96179, 96180

MSFT: MS13-063

MSKB: 2859537

IAVB: 2013-B-0088