7.8 CVE-2013-3660

CISA Kev Catalog Buffer Overflow Used by Malware Patch Exploit
 

The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 does not properly initialize a pointer for the next object in a certain list, which allows local users to obtain write access to the PATHRECORD chain, and consequently gain privileges, by triggering excessive consumption of paged memory and then making many FlattenPath function calls, aka "Win32k Read AV Vulnerability."
https://nvd.nist.gov/vuln/detail/CVE-2013-3660

Categories

CWE-119 : Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. This term has many different meanings to different audiences. From a CWE mapping perspective, this term should be avoided where possible. Some researchers, developers, and tools intend for it to mean "write past the end of a buffer," whereas others use the same term to mean "any read or write outside the boundaries of a buffer, whether before the beginning of the buffer or after the end of the buffer." Others could mean "any action after the end of a buffer, whether it is a read or write." Since the term is commonly used for exploitation and for vulnerabilities, it further confuses things. Some prominent vendors and researchers use the term "buffer overrun," but most people use "buffer overflow." See the alternate term for "buffer overflow" for context. Generally used for techniques that avoid weaknesses related to memory access, such as those identified by CWE-119 and its descendants. However, the term is not formal, and there is likely disagreement between practitioners as to which weaknesses are implicitly covered by the "memory safety" term. This weakness can be detected using dynamic tools and techniques that interact with the software using large test suites with many diverse inputs, such as fuzz testing (fuzzing), robustness testing, and fault injection. The software's operation may slow down, but it should not become unstable, crash, or generate incorrect results. Replace unbounded copy functions with analogous functions that support length arguments, such as strcpy with strncpy. Create these if they are not available. Incorrect URI normalization in application traffic product leads to buffer overflow, as exploited in the wild per CISA KEV. Buffer overflow in Wi-Fi router web interface, as exploited in the wild per CISA KEV. Classic stack-based buffer overflow in media player using a long entry in a playlist Heap-based buffer overflow in media player using a long entry in a playlist large precision value in a format string triggers overflow negative offset value leads to out-of-bounds read malformed inputs cause accesses of uninitialized or previously-deleted objects, leading to memory corruption chain: lack of synchronization leads to memory corruption Chain: machine-learning product can have a heap-basedbuffer overflow (CWE-122) when some integer-oriented bounds arecalculated by using ceiling() and floor() on floating point values(CWE-1339) attacker-controlled array index leads to code execution chain: -1 value from a function call was intended to indicate an error, but is used as an array index instead. chain: incorrect calculations lead to incorrect pointer dereference and memory corruption product accepts crafted messages that lead to a dereference of an arbitrary pointer chain: malformed input causes dereference of uninitialized memory OS kernel trusts userland-supplied length value, allowing reading of sensitive information Chain: integer overflow in securely-coded mail program leads to buffer overflow. In 2005, this was regarded as unrealistic to exploit, but in 2020, it was rediscovered to be easier to exploit due to evolutions of the technology. buffer overflow involving a regular expression with a large number of captures chain: unchecked message size metadata allows integer overflow (CWE-190) leading to buffer overflow (CWE-119).

References

af854a3a-2127-422b-91ae-364da2661108 Patch Exploit

http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0090.html
Broken Link
http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0094.html
Broken Link
http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0006.html
Broken Link
http://secunia.com/advisories/53435
Broken Link Vendor Advisory
http://twitter.com/taviso/statuses/309157606247768064
Exploit
http://twitter.com/taviso/statuses/335557286657400832
Not Applicable
http://www.computerworld.com/s/article/9239477
Broken Link
http://www.exploit-db.com/exploits/25611/
Exploit Third Party Advisory VDB Entry
http://www.osvdb.org/93539
Broken Link
http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_v...
Exploit Issue Tracking
http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-di...
Press/Media Coverage
http://www.us-cert.gov/ncas/alerts/TA13-190A
Third Party Advisory US Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13...
Patch Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
Broken Link

cve@mitre.org Patch Exploit

http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0090.html
Broken Link
http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0094.html
Broken Link
http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0006.html
Broken Link
http://secunia.com/advisories/53435
Broken Link Vendor Advisory
http://twitter.com/taviso/statuses/309157606247768064
Exploit
http://twitter.com/taviso/statuses/335557286657400832
Not Applicable
http://www.computerworld.com/s/article/9239477
Broken Link
http://www.exploit-db.com/exploits/25611/
Exploit Third Party Advisory VDB Entry
http://www.osvdb.org/93539
Broken Link
http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_v...
Exploit Issue Tracking
http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-di...
Press/Media Coverage
http://www.us-cert.gov/ncas/alerts/TA13-190A
Third Party Advisory US Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13...
Patch Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
Broken Link


 

CPE

cpe start end
Configuration 1
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*


REMEDIATION


Patch

Url
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13...
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13...


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
http://twitter.com/taviso/statuses/309157606247768064
http://www.exploit-db.com/exploits/25611/
http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_v...
http://twitter.com/taviso/statuses/309157606247768064
http://www.exploit-db.com/exploits/25611/
http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_v...


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
10 Buffer Overflow via Environment Variables
High
100 Overflow Buffers
Very High
123 Buffer Manipulation
Very High
14 Client-side Injection-induced Buffer Overflow
High
24 Filter Failure through Buffer Overflow
High
42 MIME Conversion
High
44 Overflow Binary Resource File
Very High
45 Buffer Overflow via Symbolic Links
High
46 Overflow Variables and Tags
High
47 Buffer Overflow via Parameter Expansion
High
8 Buffer Overflow in an API Call
High
9 Buffer Overflow in Local Command-Line Utilities
High