First published: Wed Mar 13 2013(Updated: )
Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote attackers to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference Vulnerability."
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Silverlight | ||
Microsoft Silverlight | >=5.0<5.1.20125.0 | |
Microsoft Silverlight | <=5.0.61118.0 | |
Microsoft Silverlight | =5.0.60401.0 | |
Microsoft Silverlight | =5.0.60818.0-rc | |
Microsoft Windows Server | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows 7 | ||
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.0 | ||
Microsoft Windows 8.0 | ||
Microsoft Windows Vista | ||
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Apple iOS and macOS |
The impacted product is end-of-life and should be disconnected if still in use.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0074 has been assigned a severity rating of critical due to its potential for remote code execution.
To fix CVE-2013-0074, upgrade Microsoft Silverlight to version 5.1.20125.0 or later.
CVE-2013-0074 affects Microsoft Silverlight versions prior to 5.1.20125.0, and specific older versions of Windows.
Yes, exploitation of CVE-2013-0074 can allow attackers to execute arbitrary code, potentially leading to data breaches.
There are no recommended workarounds for CVE-2013-0074; updating Silverlight is the best option.