CVE-2013-1296
Microsoft Internet Explorer RDP ActiveX Control Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The Remote Desktop ActiveX control in mstscax.dll in Microsoft Remote Desktop Connection Client 6.1 and 7.0 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code via a web page that triggers access to a deleted object, and allows remote RDP servers to execute arbitrary code via unspecified vectors that trigger access to a deleted object, aka "RDP ActiveX Control Remote Code Execution Vulnerability."
El Remote Desktop ActiveX control en mstscax.dll en Microsoft Remote Desktop Connection Client v6.1 y v7.0 no controla correctamente los objetos en memoria, lo que permite a atacantes remotos ejecutar código arbitrario a través de una página web que pone en marcha el acceso a un objeto eliminado, y permite remoto RDP servidores para ejecutar código arbitrario a través de vectores no especificados que el acceso de disparo a un objeto eliminado, alias "RDP ActiveX control de código vulnerabilidad de ejecución remota".
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within Remote Desktop ActiveX control. By manipulating TransportSettings or AdvancedSettings, an attacker can force a dangling pointer to be reused after it has been freed. An attacker can leverage this to gain code execution in the context of the current user.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-01-12 CVE Reserved
- 2013-04-09 CVE Published
- 2024-08-06 CVE Updated
- 2025-01-06 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.us-cert.gov/ncas/alerts/TA13-100A | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16598 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-029 | 2018-10-12 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Remote Desktop Connection Search vendor "Microsoft" for product "Remote Desktop Connection" | 6.1 Search vendor "Microsoft" for product "Remote Desktop Connection" and version "6.1" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Remote Desktop Connection Search vendor "Microsoft" for product "Remote Desktop Connection" | 7.0 Search vendor "Microsoft" for product "Remote Desktop Connection" and version "7.0" | - |
Affected
|