Lucene search

K
cve[email protected]CVE-2013-0002
HistoryJan 09, 2013 - 6:09 p.m.

CVE-2013-0002

2013-01-0918:09:39
CWE-119
web.nvd.nist.gov
132
cve-2013-0002
buffer overflow
winforms
microsoft .net framework
arbitrary code execution

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

AI Score

Confidence

Low

0.852 High

EPSS

Percentile

98.6%

Buffer overflow in the Windows Forms (aka WinForms) component in Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, and 4.5 allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application that leverages improper counting of objects during a memory copy operation, aka β€œWinForms Buffer Overflow Vulnerability.”

Affected configurations

NVD
Node
microsoft.net_frameworkMatch1.0sp3
AND
microsoftwindows_xpMatch-sp3media_center
OR
microsoftwindows_xpMatch-sp3tablet_pc
Node
microsoft.net_frameworkMatch1.1sp1
AND
microsoftwindows_server_2003sp2
OR
microsoftwindows_server_2008sp2x64
OR
microsoftwindows_server_2008sp2x86
OR
microsoftwindows_server_2008Match-sp2itanium
OR
microsoftwindows_vistasp2
OR
microsoftwindows_vistaMatch-sp2
OR
microsoftwindows_xpsp3
OR
microsoftwindows_xpMatch-sp2x64
Node
microsoft.net_frameworkMatch2.0sp2
AND
microsoftwindows_server_2003sp2
OR
microsoftwindows_server_2008sp2x64
OR
microsoftwindows_server_2008sp2x86
OR
microsoftwindows_server_2008Match-sp2itanium
OR
microsoftwindows_vistasp2
OR
microsoftwindows_vistaMatch-sp2
OR
microsoftwindows_xpsp3
OR
microsoftwindows_xpMatch-sp2x64
Node
microsoft.net_frameworkMatch4.0
AND
microsoftwindows_7Match-
OR
microsoftwindows_7Match-sp1x64
OR
microsoftwindows_7Match-sp1x86
OR
microsoftwindows_server_2003sp2
OR
microsoftwindows_server_2008r2itanium
OR
microsoftwindows_server_2008r2x64
OR
microsoftwindows_server_2008sp2x64
OR
microsoftwindows_server_2008sp2x86
OR
microsoftwindows_server_2008Match-sp2itanium
OR
microsoftwindows_vistasp2
OR
microsoftwindows_vistaMatch-sp2
OR
microsoftwindows_xpsp3
OR
microsoftwindows_xpMatch-sp2x64
Node
microsoft.net_frameworkMatch3.5
AND
microsoftwindows_8Match--x64
OR
microsoftwindows_8Match--x86
OR
microsoftwindows_server_2012Match-
Node
microsoft.net_frameworkMatch3.5.1
AND
microsoftwindows_7Match-
OR
microsoftwindows_7Match-sp1x64
OR
microsoftwindows_7Match-sp1x86
OR
microsoftwindows_server_2008r2itanium
OR
microsoftwindows_server_2008r2x64
Node
microsoft.net_frameworkMatch4.5
AND
microsoftwindows_7Match-sp1x64
OR
microsoftwindows_7Match-sp1x86
OR
microsoftwindows_8Match--x64
OR
microsoftwindows_8Match--x86
OR
microsoftwindows_rtMatch-
OR
microsoftwindows_server_2012Match-
OR
microsoftwindows_vistasp2
OR
microsoftwindows_vistaMatch-sp2

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

AI Score

Confidence

Low

0.852 High

EPSS

Percentile

98.6%