9.3
CVE-2013-0003
- EPSS 61.32%
- Veröffentlicht 09.01.2013 18:09:40
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle secure@microsoft.com
- Teams Watchlist Login
- Unerledigt Login
Buffer overflow in a System.DirectoryServices.Protocols (S.DS.P) namespace method in Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, and 4.5 allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application that leverages a missing array-size check during a memory copy operation, aka "S.DS.P Buffer Overflow Vulnerability."
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ .Net Framework Version2.0 Updatesp2
Microsoft ≫ Windows Server 2003 Updatesp2
Microsoft ≫ Windows Server 2008 Updatesp2 Editionx64
Microsoft ≫ Windows Server 2008 Updatesp2 Editionx86
Microsoft ≫ Windows Server 2008 Version- Updatesp2 Editionitanium
Microsoft ≫ Windows Vista Updatesp2
Microsoft ≫ Windows Vista Version- Updatesp2
Microsoft ≫ Windows Xp Updatesp3
Microsoft ≫ Windows Xp Version- Updatesp2 Editionx64
Microsoft ≫ Windows Server 2008 Updatesp2 Editionx64
Microsoft ≫ Windows Server 2008 Updatesp2 Editionx86
Microsoft ≫ Windows Server 2008 Version- Updatesp2 Editionitanium
Microsoft ≫ Windows Vista Updatesp2
Microsoft ≫ Windows Vista Version- Updatesp2
Microsoft ≫ Windows Xp Updatesp3
Microsoft ≫ Windows Xp Version- Updatesp2 Editionx64
Microsoft ≫ .Net Framework Version4.0
Microsoft ≫ Windows 7 Version-
Microsoft ≫ Windows 7 Version- Updatesp1 Editionx64
Microsoft ≫ Windows 7 Version- Updatesp1 Editionx86
Microsoft ≫ Windows Server 2003 Updatesp2
Microsoft ≫ Windows Server 2008 Updater2 Editionitanium
Microsoft ≫ Windows Server 2008 Updater2 Editionx64
Microsoft ≫ Windows Server 2008 Updatesp2 Editionx64
Microsoft ≫ Windows Server 2008 Updatesp2 Editionx86
Microsoft ≫ Windows Server 2008 Version- Updatesp2 Editionitanium
Microsoft ≫ Windows Vista Updatesp2
Microsoft ≫ Windows Vista Version- Updatesp2
Microsoft ≫ Windows Xp Updatesp3
Microsoft ≫ Windows Xp Version- Updatesp2 Editionx64
Microsoft ≫ Windows 7 Version- Updatesp1 Editionx64
Microsoft ≫ Windows 7 Version- Updatesp1 Editionx86
Microsoft ≫ Windows Server 2003 Updatesp2
Microsoft ≫ Windows Server 2008 Updater2 Editionitanium
Microsoft ≫ Windows Server 2008 Updater2 Editionx64
Microsoft ≫ Windows Server 2008 Updatesp2 Editionx64
Microsoft ≫ Windows Server 2008 Updatesp2 Editionx86
Microsoft ≫ Windows Server 2008 Version- Updatesp2 Editionitanium
Microsoft ≫ Windows Vista Updatesp2
Microsoft ≫ Windows Vista Version- Updatesp2
Microsoft ≫ Windows Xp Updatesp3
Microsoft ≫ Windows Xp Version- Updatesp2 Editionx64
Microsoft ≫ .Net Framework Version3.5
Microsoft ≫ .Net Framework Version3.5.1
Microsoft ≫ Windows 7 Version-
Microsoft ≫ Windows 7 Version- Updatesp1 Editionx64
Microsoft ≫ Windows 7 Version- Updatesp1 Editionx86
Microsoft ≫ Windows Server 2008 Updater2 Editionitanium
Microsoft ≫ Windows Server 2008 Updater2 Editionx64
Microsoft ≫ Windows 7 Version- Updatesp1 Editionx64
Microsoft ≫ Windows 7 Version- Updatesp1 Editionx86
Microsoft ≫ Windows Server 2008 Updater2 Editionitanium
Microsoft ≫ Windows Server 2008 Updater2 Editionx64
Microsoft ≫ .Net Framework Version4.5
Microsoft ≫ Windows 7 Version- Updatesp1 Editionx64
Microsoft ≫ Windows 7 Version- Updatesp1 Editionx86
Microsoft ≫ Windows 8 Version- Update- Editionx64
Microsoft ≫ Windows 8 Version- Update- Editionx86
Microsoft ≫ Windows Rt Version-
Microsoft ≫ Windows Server 2012 Version-
Microsoft ≫ Windows Vista Updatesp2
Microsoft ≫ Windows Vista Version- Updatesp2
Microsoft ≫ Windows 7 Version- Updatesp1 Editionx86
Microsoft ≫ Windows 8 Version- Update- Editionx64
Microsoft ≫ Windows 8 Version- Update- Editionx86
Microsoft ≫ Windows Rt Version-
Microsoft ≫ Windows Server 2012 Version-
Microsoft ≫ Windows Vista Updatesp2
Microsoft ≫ Windows Vista Version- Updatesp2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 61.32% | 0.983 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.3 | 8.6 | 10 |
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.