CVE-2013-0074
Microsoft Silverlight Double Dereference Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
4Exploited in Wild
YesDecision
Descriptions
Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote attackers to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference Vulnerability."
Microsoft Silverlight v5 y 5 Developer Runtime anterior a 5.1.20125.0 no valida adecuadamente los punteros durante el renderizado de un objeto HTML, lo que permite a atacantes remotos ejecutar código de su elección a través de una aplicación Silverlight manipulada. Aka "Silverlight Double Dereference Vulnerability."
Microsoft Silverlight 5 suffers from invalid typecast and memory disclosure vulnerabilities that, when leveraged together, allow for arbitrary code execution. A memory disclosure vulnerability exists in the public WriteableBitmap class from System.Windows.dll. This class allows reading of image pixels from the user-defined data stream via the public SetSource() method. BitmapSource.ReadStream() allocates and returns byte array and a count of array items as out parameters. These returned values are taken from the input stream and they can be fully controlled by the untrusted code. When returned "count" is greater than "array.Length", then data outside the "array" are used as input stream data by the native BitmapSource_SetSource() from agcore.dll. Later all data can be viewed via the public WriteableBitmap.Pixels[] property. Exploitation details related to these findings were purchased through the Packet Storm Bug Bounty program.
Microsoft Silverlight does not properly validate pointers during HTML object rendering, which allows remote attackers to execute code via a crafted Silverlight application.
CVSS Scores
SSVC
- Decision:Act
Timeline
- 2012-11-27 CVE Reserved
- 2013-03-12 First Exploit
- 2013-03-13 CVE Published
- 2022-05-25 Exploited in Wild
- 2022-06-15 KEV Due Date
- 2025-02-10 CVE Updated
- 2025-03-18 EPSS Updated
CWE
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://www.us-cert.gov/ncas/alerts/TA13-071A | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16516 | Broken Link | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16565 | Broken Link |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/123731 | 2013-10-23 | |
https://packetstorm.news/files/id/124182 | 2013-11-26 | |
https://www.exploit-db.com/exploits/41702 | 2013-03-12 | |
https://www.exploit-db.com/exploits/29858 | 2013-11-27 |
URL | Date | SRC |
---|---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-022 | 2024-06-28 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Silverlight Search vendor "Microsoft" for product "Silverlight" | >= 5.0 < 5.1.20125.0 Search vendor "Microsoft" for product "Silverlight" and version " >= 5.0 < 5.1.20125.0" | - |
Affected
|