MS13-063: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2859537)

high Nessus Plugin ID 69328
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The Windows kernel on the remote host is affected by multiple vulnerabilities.


The Windows version installed on the remote host is affected by multiple vulnerabilities :

- The Windows kernel is affected by multiple privilege escalation vulnerabilities due to a memory corruption condition in the NT Virtual DOS Machine (NTVDM). An attacker who successfully exploited these issues could run arbitrary code in kernel mode.
(CVE-2013-3196, CVE-2013-3197, CVE-2013-3198)

- A vulnerability exists in a security feature of Windows due to the improper implementation of Address Space Layout Randomization (ASLR). An attacker could bypass the ASLR security feature to load a malicious DLL.


Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, 2008 R2, and 8.

See Also

Plugin Details

Severity: High

ID: 69328

File Name: smb_nt_ms13-063.nasl

Version: 1.14

Type: local

Agent: windows

Published: 8/14/2013

Updated: 6/3/2021

Dependencies: smb_hotfixes.nasl, ms_bulletin_checks_possible.nasl

Risk Information

CVSS Score Source: CVE-2013-2556


Risk Factor: High

Score: 7.4


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 8/13/2013

Vulnerability Publication Date: 3/7/2013

Reference Information

CVE: CVE-2013-2556, CVE-2013-3196, CVE-2013-3197, CVE-2013-3198

BID: 58566, 61682, 61683, 61684

MSFT: MS13-063

MSKB: 2859537

IAVB: 2013-B-0088-S