First published: Wed Jan 09 2013(Updated: )
Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly validate the permissions of objects in memory, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application, aka "Double Construction Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Microsoft .NET Framework 4 | =1.0-sp3 | |
Any of | ||
Microsoft Windows XP | =sp3 | |
Microsoft Windows XP | =sp3 | |
All of | ||
Microsoft .NET Framework 4 | =1.1-sp1 | |
Any of | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows XP | =sp2 | |
All of | ||
Microsoft .NET Framework 4 | =2.0-sp2 | |
Any of | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows XP | =sp2 | |
All of | ||
Microsoft .NET Framework 4 | =4.0 | |
Any of | ||
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows XP | =sp2 | |
All of | ||
Microsoft .NET Framework 4 | =3.5 | |
Any of | ||
Microsoft Windows 8.0 | ||
Microsoft Windows 8.0 | ||
Microsoft Windows Server | ||
All of | ||
Microsoft .NET Framework 4 | =3.5.1 | |
Any of | ||
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =r2 | |
All of | ||
Microsoft .NET Framework 4 | =4.5 | |
Any of | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.0 | ||
Microsoft Windows 8.0 | ||
Microsoft Windows RT | ||
Microsoft Windows Server | ||
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft .NET Framework 4 | =1.0-sp3 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows XP | =sp3 | |
Microsoft .NET Framework 4 | =1.1-sp1 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows XP | =sp2 | |
Microsoft .NET Framework 4 | =2.0-sp2 | |
Microsoft .NET Framework 4 | =4.0 | |
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =r2 | |
Microsoft .NET Framework 4 | =3.5 | |
Microsoft Windows 8.0 | ||
Microsoft Windows 8.0 | ||
Microsoft Windows Server | ||
Microsoft .NET Framework 4 | =3.5.1 | |
Microsoft .NET Framework 4 | =4.5 | |
Microsoft Windows RT |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-0004 is rated as critical, as it allows attackers to execute arbitrary code on affected systems.
To fix CVE-2013-0004, Microsoft recommends upgrading to a later, non-vulnerable version of the .NET Framework.
CVE-2013-0004 affects various versions of the Microsoft .NET Framework including 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, and 4.5.
Yes, CVE-2013-0004 can be exploited remotely via a crafted XAML browser application or a malicious .NET Framework application.
The potential impacts of CVE-2013-0004 include unauthorized access, execution of arbitrary code, and possible system compromise.