CVE-2013-3896
Microsoft Silverlight Information Disclosure Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
YesDecision
Descriptions
Microsoft Silverlight 5 before 5.1.20913.0 does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application, aka "Silverlight Vulnerability."
Microsoft Silverlight 5 anterior a la versión 5.1.20913.0 no valida punteros adecuadamente durante el acceso a elementos Silverlight, lo que permite a atacantes remotos obtener información sensible a través de una aplicación Silverlight manipulada, también conocido como "Vulnerabilidad en Silverlight".
Microsoft Silverlight 5 suffers from invalid typecast and memory disclosure vulnerabilities that, when leveraged together, allow for arbitrary code execution. A memory disclosure vulnerability exists in the public WriteableBitmap class from System.Windows.dll. This class allows reading of image pixels from the user-defined data stream via the public SetSource() method. BitmapSource.ReadStream() allocates and returns byte array and a count of array items as out parameters. These returned values are taken from the input stream and they can be fully controlled by the untrusted code. When returned "count" is greater than "array.Length", then data outside the "array" are used as input stream data by the native BitmapSource_SetSource() from agcore.dll. Later all data can be viewed via the public WriteableBitmap.Pixels[] property. Exploitation details related to these findings were purchased through the Packet Storm Bug Bounty program.
Microsoft Silverlight does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2013-03-12 First Exploit
- 2013-06-03 CVE Reserved
- 2013-10-09 CVE Published
- 2022-05-25 Exploited in Wild
- 2022-06-15 KEV Due Date
- 2025-01-02 EPSS Updated
- 2025-02-10 CVE Updated
CWE
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://www.us-cert.gov/ncas/alerts/TA13-288A | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19003 | Broken Link | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19055 | Broken Link |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/123731 | 2013-10-23 | |
https://packetstorm.news/files/id/124182 | 2013-11-26 | |
https://www.exploit-db.com/exploits/41702 | 2013-03-12 |
URL | Date | SRC |
---|---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-087 | 2024-06-28 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Silverlight Search vendor "Microsoft" for product "Silverlight" | >= 5.0 < 5.1.20913.0 Search vendor "Microsoft" for product "Silverlight" and version " >= 5.0 < 5.1.20913.0" | - |
Affected
|