Lucene search

K
nessusThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.SMB_NT_MS13-011.NASL
HistoryFeb 12, 2013 - 12:00 a.m.

MS13-011: Vulnerability in Media Decompression Could Allow Remote Code Execution (2780091)

2013-02-1200:00:00
This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
www.tenable.com
24

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.913 High

EPSS

Percentile

98.9%

The remote Windows host is potentially affected by a vulnerability that could allow remote code execution if a user opens a specially crafted media file (such as an .mpg file), opens a Microsoft Office document (such as a .ppt file) that contains a specially crafted embedded media file, or receives specially crafted streaming content. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(64572);
  script_version("1.10");
  script_cvs_date("Date: 2018/11/15 20:50:31");

  script_cve_id("CVE-2013-0077");
  script_bugtraq_id(57857);
  script_xref(name:"MSFT", value:"MS13-011");
  script_xref(name:"MSKB", value:"2780091");
  script_xref(name:"IAVA", value:"2013-A-0042");

  script_name(english:"MS13-011: Vulnerability in Media Decompression Could Allow Remote Code Execution (2780091)");
  script_summary(english:"Checks version of Quartz.dll");

  script_set_attribute(
    attribute:"synopsis",
    value:
"The remote Windows host is potentially affected by a code execution
vulnerability."
  );
  script_set_attribute(
    attribute:"description",
    value:
"The remote Windows host is potentially affected by a vulnerability that
could allow remote code execution if a user opens a specially crafted
media file (such as an .mpg file), opens a Microsoft Office document
(such as a .ppt file) that contains a specially crafted embedded media
file, or receives specially crafted streaming content.  An attacker who
successfully exploited this vulnerability could gain the same user
rights as the current user.  Users whose accounts are configured to have
fewer user rights on the system could be less impacted than users who
operate with administrative user rights."
  );
  script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2013/ms13-011");
  script_set_attribute(
    attribute:"solution",
    value:"Microsoft has released a set of patches for XP, 2003, Vista, and 2008."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/02/12");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/02/12");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/02/12");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
  script_set_attribute(attribute:"stig_severity", value:"II");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows : Microsoft Bulletins");

  script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");

  script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
  script_require_keys("SMB/MS_Bulletin_Checks/Possible");
  script_require_ports(139, 445, 'Host/patch_management_checks');

  exit(0);
}

include("audit.inc");
include("smb_func.inc");
include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("misc_func.inc");

get_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');

bulletin = 'MS13-011';
kb = '2780091';

kbs = make_list(kb);
if (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);

get_kb_item_or_exit("SMB/Registry/Enumerated");
get_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);

# This issue only affects XP, 2003, Vista, and 2008
if (hotfix_check_sp_range(xp:'3', win2003:'2', vista:'2') <= 0) audit(AUDIT_OS_SP_NOT_VULN);

productname = get_kb_item_or_exit("SMB/ProductName", exit_code:1);
if ("Windows Embedded" >< productname) exit(0, "The host is running "+productname+" and is not affected.");

# This issue does not affect server core installs
if (hotfix_check_server_core() == 1) audit(AUDIT_WIN_SERVER_CORE);

rootfile = hotfix_get_systemroot();
if (!rootfile) exit(1, "Failed to get the system root.");

share = hotfix_path2share(path:rootfile);
if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);

if (
  # XP SP3
  hotfix_is_vulnerable(os:"5.1",             sp:3, file:"Quartz.dll",   version:"6.5.2600.6333",    min_version:"6.5.2600.0",         dir:"\System32", bulletin:bulletin, kb:kb) ||

  # 2003 SP2 & 2003 x64 SP2 & XP Pro x64 SP2
  hotfix_is_vulnerable(os:"5.2",             sp:2, file:"Quartz.dll",   version:"6.5.3790.5105",    min_version:"6.5.3790.0",         dir:"\System32", bulletin:bulletin, kb:kb) ||

  # Vista SP2 & Vista x64 SP2 & 2008 SP2 & 2008 x64 SP2
  hotfix_is_vulnerable(os:"6.0",             sp:2, file:"Quartz.dll",   version:"6.6.6002.18725",   min_version:"6.6.6002.18000",     dir:"\system32", bulletin:bulletin, kb:kb) ||
  hotfix_is_vulnerable(os:"6.0",             sp:2, file:"Quartz.dll",   version:"6.6.6002.22969",   min_version:"6.6.6002.22000",     dir:"\system32", bulletin:bulletin, kb:kb)
)
{
  set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
  hotfix_security_hole();
  hotfix_check_fversion_end();
  exit(0);
}
else
{
  hotfix_check_fversion_end();
  audit(AUDIT_HOST_NOT, 'affected');
}
VendorProductVersionCPE
microsoftwindowscpe:/o:microsoft:windows

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.913 High

EPSS

Percentile

98.9%