Korean
<< Back
VID 26657
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The hotfix (MS13-081, 2870008) for 'Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution' has not been applied.
This security update resolves seven privately reported vulnerabilities in Microsoft Windows. The most severe vulnerability could allow remote code execution if a user views shared content that embeds OpenType or TrueType font files. An attacker who successfully exploited this vulnerability could take complete control of an affected system.

- OpenType Font Parsing Vulnerability (CVE-2013-3128)
A remote code execution vulnerability exists in the way that Windows parses specially crafted OpenType fonts (OTF). An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.

- Windows USB Descriptor Vulnerability (CVE-2013-3200)
An elevation of privilege vulnerability exists when Windows USB drivers improperly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.

- Win32k Use After Free Vulnerability (CVE-2013-3879)
An elevation of privilege vulnerability exists when the Windows kernel-mode driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.

- App Container Elevation of Privilege Vulnerability (CVE-2013-3880)
The vulnerability is caused when Windows improperly handles objects in memory. An attacker who successfully exploited this vulnerability could disclose information from within an App Container on the local system.

- Win32k NULL Page Vulnerability (CVE-2013-3881)
An elevation of privilege vulnerability exists when the Windows kernel-mode driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.

- DirectX Graphics Kernel Subsystem Double Fetch Vulnerability (CVE-2013-3888)
An elevation of privilege vulnerability exists when the Microsoft DirectX graphics kernel subsystem (dxgkrnl.sys) improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.

- TrueType Font CMAP Table Vulnerability (CVE-2013-3894)
A remote code execution vulnerability exists in the way that Windows parses specially crafted TrueType fonts (TTF). An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
https://technet.microsoft.com/en-us/security/bulletin/ms13-081

* Platforms Affected:
Windows XP Service Pack 3
Windows Server 2003 Service Pack 2
Windows Vista Service Pack 2
Windows Server 2008 Service Pack 2
Windows Server 2008 R2 Service Pack 1
Windows 7 Service Pack 1
Windows 8
Windows Server 2012
Recommendation Apply the appropriate patch(2870008) for your system, as listed in Microsoft Security Bulletin MS13-081 at http://technet.microsoft.com/en-us/security/bulletin/ms13-081
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2013-3128,CVE-2013-3200,CVE-2013-3879,CVE-2013-3880,CVE-2013-3881,CVE-2013-3888,CVE-2013-3894 (CVE)
Related URL 62819,62821,62823,62828,62830,62831,62833 (SecurityFocus)
Related URL (ISS)