Lucene search

K
mskbMicrosoftKB5029365
HistorySep 12, 2023 - 7:00 a.m.

Description of the security update for the remote code execution vulnerability in Microsoft Visual Studio 2013 Update 5: October 10, 2023 (KB5029365)

2023-09-1207:00:00
Microsoft
support.microsoft.com
192
microsoft
visual studio 2013
update 5
remote code execution
kb5029365
security update
cve-2023-36796
cve-2023-36792
cve-2023-36794
cve-2023-36793
download
installation
prerequisites
restart requirement
file hash
file information
installation verification
protection and security

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.2%

Description of the security update for the remote code execution vulnerability in Microsoft Visual Studio 2013 Update 5: October 10, 2023 (KB5029365)

**Applies to:**All Visual Studio 2013 Update 5 editions except Integrated Shell, Build Tools, and Remote Tools.

NoticeIn December 2023, Visual Studio 2013 Update 5 was revised to address a compatibility issue that affects precompiled headers in VC++ projects.

Summary

A remote code execution vulnerability exists in Microsoft Visual Studio 2013 when it incorrectly handles debug information.To learn more about the vulnerability, see CVE-2023-36796, CVE-2023-36792, CVE-2023-36794, and CVE-2023-36793.

How to obtain and install the update

Method 1: Microsoft Download

The following file is available for download:Download icon Download the hotfix package now.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

More information

Prerequisites

To apply this security update, you must have Visual Studio 2013 Update 5 installed.

Restart requirement

We recommend that you close Visual Studio 2013 before you install this security update. Otherwise, you may have to restart the computer after you apply this security update if a file that is being updated is open or in use by Visual Studio.

Security update replacement information

This security update supersedes security update KB5026610.

File hash information

File name SHA256 hash
vs12-kb5029365.exe 951E3FDFBB30CD4C2CA0AB16DB3EA24624D009296EDDF57D8CB810E93EA522E6

File information

File name File version File size Date Time
vs12-kb5029365.exe 12.0.40708.0 37,171,200 11/18/2023 5:19 AM

Installation verification

To verify that this security update is applied correctly, follow these steps:

  1. Open the Visual Studio 2013 program folder.
  2. Locate one or more of the following files:vc\bin\bscmake.exevc\bin\amd64\bscmake.execommon7\ide\msdia120.dllcommon7\ide\remote debugger\x64\msdia120.dllcommon7\ide\remote debugger\x86\msdia120.dllcommon7\packages\debugger\msdia120.dlldia sdk\bin\msdia120.dlldia sdk\bin\amd64\msdia120.dlldia sdk\bin\arm\msdia120.dllteam tools\dynamic code coverage tools\msdia120.dllteam tools\performance tools\x64\msdia120.dllcommon7\ide\msobj120.dllteam tools\performance tools\x64\msobj120.dllVc\bin\msobj120.dllVc\bin\amd64\msobj120.dllvc\bin\mspdb120.dllvc\bin\amd64\mspdb120.dllvc\bin\ mspdbcore.dllVc\bin\amd64\mspdbcore.dllteam tools\performance tools\x64\mspdbcore.dllteam tools\performance tools\mspdbcore.dllteam tools\performance tools\mspdbsrv.exeteam tools\performance tools\x64\mspdbsrv.exevc\bin\mspdbsrv.exevc\bin\amd64\mspdbsrv.exeCommon7\ide\mspdbst.dllteam tools\performance tools\mspdbst.dllteam tools\performance tools\x64\mspdbst.dllVc\bin\amd64\mspdbst.dllCommon7\IDE\Remote Debugger\x64\msvsmon.exeCommon7\IDE\Remote Debugger\msvsmon.exeCommon7\Packages\Debugger\VSDEBUG.DLLPdbcopy.exeshmetapdb.dll
  3. Verify that the file version is equal to or greater than 12.0.40708.7.

Information about protection and security

Protect yourself online: Windows Security supportLearn how we guard against cyber threats: Microsoft Security

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.2%