Summary
This host is missing an critical security update according to Microsoft Bulletin MS13-082.
Impact
Successful exploitation will allow remote attackers to execute the arbitrary code, exhaust available system resource, cause a DoS (Denial of Service) and compromise the system.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, https://technet.microsoft.com/en-us/security/bulletin/ms13-082
Insight
Multiple flaws are due to,
- An unspecified error when handling OpenType fonts (OTF).
- An error when when expanding entity references.
- An unspecified error when parsing JSON data.
Affected
Microsoft .NET Framework 2.x
Microsoft .NET Framework 3.x
Microsoft .NET Framework 4.x
Detection
Get the vulnerable file version and check appropriate patch is applied or not.
References
Severity
Classification
-
CVE CVE-2013-3128, CVE-2013-3860, CVE-2013-3861 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Certificate Validation Flaw Could Enable Identity Spoofing (Q328145)
- Microsoft Internet Explorer Memory Corruption Vulnerability (2755801)
- Microsoft .NET Framework and Microsoft Silverlight Remote Code Execution Vulnerabilities (2651026)
- Embedded OpenType Font Engine Remote Code Execution Vulnerability (982132)
- Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (972270)