Vulnerabilities > CVE-2013-3870 - Resource Management Errors vulnerability in Microsoft Outlook 2007/2010

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Double free vulnerability in Microsoft Outlook 2007 SP3 and 2010 SP1 and SP2 allows remote attackers to execute arbitrary code by including many nested S/MIME certificates in an e-mail message, aka "Message Certificate Vulnerability."

Vulnerable Configurations

Part Description Count
Application
Microsoft
5

Common Weakness Enumeration (CWE)

Msbulletin

bulletin_idMS13-068
bulletin_url
date2013-09-10T00:00:00
impactRemote Code Execution
knowledgebase_id2756473
knowledgebase_url
severityCritical
titleVulnerability in Microsoft Outlook Could Allow Remote Code Execution

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS13-068.NASL
descriptionThe Outlook component of Microsoft Office is affected by a remote code execution vulnerability due to a flaw in how Outlook parses S/MIME messages. It is possible for a remote attacker to execute arbitrary code if a user opens or previews a specially crafted email in an affected version of Outlook.
last seen2020-06-01
modified2020-06-02
plugin id69828
published2013-09-11
reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/69828
titleMS13-068: Vulnerability in Microsoft Outlook Could Allow Remote Code Execution (2756473)
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if (description)
{
  script_id(69828);
  script_version("1.10");
  script_cvs_date("Date: 2018/11/15 20:50:31");

  script_cve_id("CVE-2013-3870");
  script_bugtraq_id(62188);
  script_xref(name:"MSFT", value:"MS13-068");
  script_xref(name:"MSKB", value:"2825999");
  script_xref(name:"MSKB", value:"2794707");

  script_name(english:"MS13-068: Vulnerability in Microsoft Outlook Could Allow Remote Code Execution (2756473)");
  script_summary(english:"Checks version of Outlook.exe");

  script_set_attribute(
    attribute:"synopsis",
    value:
"The version of Microsoft Office installed on the remote Windows is
affected by a code execution vulnerability."
  );
  script_set_attribute(
    attribute:"description",
    value:
"The Outlook component of Microsoft Office is affected by a remote code
execution vulnerability due to a flaw in how Outlook parses S/MIME
messages.  It is possible for a remote attacker to execute arbitrary
code if a user opens or previews a specially crafted email in an
affected version of Outlook."
  );
  script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2013/ms13-068");
  script_set_attribute(attribute:"solution", value:"Microsoft has released a set of patches for Office 2007 and 2010.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/09/10");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/09/10");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/09/11");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office:2007");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office:2010");

  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows : Microsoft Bulletins");

  script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");

  script_dependencies("smb_hotfixes.nasl", "office_installed.nasl", "ms_bulletin_checks_possible.nasl");
  script_require_keys("SMB/MS_Bulletin_Checks/Possible");
  script_require_ports(139, 445, 'Host/patch_management_checks');

  exit(0);
}


include("audit.inc");
include("smb_func.inc");
include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("smb_reg_query.inc");
include("misc_func.inc");

get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");

bulletin = 'MS13-068';
kbs = make_list(
  "2825999",  # Office 2007
  "2794707"   # Office 2010
);

if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);

rootfile = hotfix_get_systemroot();
if (!rootfile) exit(1, "Failed to get the system root.");

share = hotfix_path2share(path:rootfile);
if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);

office_versions = hotfix_check_office_version();

outlook_2k7_path = get_kb_item("SMB/Office/Outlook/12.0/Path");
outlook_2k10_path = get_kb_item("SMB/Office/Outlook/14.0/Path");

vuln = 0;

# Office 2007 SP3
if (!isnull(outlook_2k7_path) && office_versions["12.0"])
{
  office_sp = get_kb_item("SMB/Office/2007/SP");
  if (!isnull(office_sp) && office_sp == 3)
  {
    if (hotfix_is_vulnerable(file:"Outlook.exe", version:"12.0.6680.5000", min_version:"12.0.0.0", path:outlook_2k7_path, bulletin:bulletin, kb:'2825999')) vuln++;
    NetUseDel(close:FALSE);
  }
}

# Office 2010 SP1 & SP2
if (!isnull(outlook_2k10_path) && office_versions["14.0"])
{
  office_sp = get_kb_item("SMB/Office/2010/SP");
  if (!isnull(office_sp) && (office_sp == 1 || office_sp == 2))
  {
    if (hotfix_is_vulnerable(file:"Outlook.exe", version:"14.0.7105.5000", min_version:"14.0.0.0", path:outlook_2k10_path, bulletin:bulletin, kb:'2794707')) vuln++;
    NetUseDel(close:FALSE);
  }
}

if (vuln)
{
  set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
  hotfix_security_hole();
  hotfix_check_fversion_end();
  exit(0);
}
else
{
  hotfix_check_fversion_end();
  audit(AUDIT_HOST_NOT, 'affected');
}

Oval

accepted2013-10-28T04:00:36.480-04:00
classvulnerability
contributors
  • nameSecPod Team
    organizationSecPod Technologies
  • nameMaria Kedovskaya
    organizationALTX-SOFT
definition_extensions
  • commentMicrosoft Outlook 2007 SP3 is installed
    ovaloval:org.mitre.oval:def:18834
  • commentMicrosoft Outlook 2010 SP1 is installed
    ovaloval:org.mitre.oval:def:18822
  • commentMicrosoft Outlook 2010 SP2 is installed
    ovaloval:org.mitre.oval:def:18700
descriptionDouble free vulnerability in Microsoft Outlook 2007 SP3 and 2010 SP1 and SP2 allows remote attackers to execute arbitrary code by including many nested S/MIME certificates in an e-mail message, aka "Message Certificate Vulnerability."
familywindows
idoval:org.mitre.oval:def:18857
statusaccepted
submitted2013-09-13T17:32:25
titleMessage Certificate Vulnerability (CVE-2013-3870) - MS13-068
version12

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 62188 CVE(CAN) ID: CVE-2013-3870 Microsoft Outlook是Office套件所捆绑的邮件客户端。 Microsoft Outlook 分析特制 S/MIME 电子邮件的方式中存在一个远程执行代码漏洞。成功利用此漏洞的攻击者可以完全控制受影响的系统。攻击者可随后安装程序;查看、更改或删除数据;或者创建拥有完全用户权限的新帐户。 0 Microsoft Office 2010 Microsoft Office 2007 Microsoft Outlook 2010 Microsoft Outlook 2007 SP2 Microsoft Outlook 2007 SP1 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS13-068)以及相应补丁: MS13-068:Vulnerability in Microsoft Outlook Could Allow Remote Code Execution (2756473) 链接:http://technet.microsoft.com/security/bulletin/MS13-068
idSSV:61008
last seen2017-11-19
modified2013-09-14
published2013-09-14
reporterRoot
titleMicrosoft Outlook 远程代码执行漏洞(CVE-2013-3870)(MS13-068)