CISA KEV 정보
| 취약점명 | Microsoft Windows Out-of-Bounds Write Vulnerability |
|---|---|
| 설명 | Microsoft Windows contains an out-of-bounds write vulnerability in the InformationCardSigninHelper Class ActiveX control, icardie.dll. An attacker could exploit the vulnerability by constructing a specially crafted webpage. When a user views the webpage, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. |
| 조치사항 | Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. |
| 랜섬웨어 캠페인 악용 | Unknown |
| 등록일 (KEV) | 2025-10-06 |
| 조치 기한 | 2025-10-27 |
| 추가 참고 | https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-090 ; https://nvd.nist.gov/vuln/detail/CVE-2013-3918 |
NVD 상세 정보
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HAV:N/AC:M/Au:N/C:C/I:C/A:C설명: The InformationCardSigninHelper Class ActiveX control in icardie.dll in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via a crafted web page that is accessed by Internet Explorer, as exploited in the wild in November 2013, aka "InformationCardSigninHelper Vulnerability."
CWE: CWE-119 | CWE-787
참조
- http://blogs.technet.com/b/msrc/archive/2013/11/11/activex-control-issue-being-addressed-in-update-tuesday.aspx [Third Party Advisory]
- http://www.darkreading.com/vulnerability/new-ie-vulnerability-found-in-the-wild-s/240163814/ [Broken Link]
- http://www.fireeye.com/blog/technical/2013/11/new-ie-zero-day-found-in-watering-hole-attack.html [Third Party Advisory]
- http://www.us-cert.gov/ncas/alerts/TA13-317A [Third Party Advisory, US Government Resource]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-090 [Patch, Vendor Advisory]
- https://isc.sans.edu/forums/diary/16985 [Third Party Advisory]
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19089 [Third Party Advisory]
- http://blogs.technet.com/b/msrc/archive/2013/11/11/activex-control-issue-being-addressed-in-update-tuesday.aspx [Third Party Advisory]
- http://www.darkreading.com/vulnerability/new-ie-vulnerability-found-in-the-wild-s/240163814/ [Broken Link]
- http://www.fireeye.com/blog/technical/2013/11/new-ie-zero-day-found-in-watering-hole-attack.html [Third Party Advisory]
- http://www.us-cert.gov/ncas/alerts/TA13-317A [Third Party Advisory, US Government Resource]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-090 [Patch, Vendor Advisory]
- https://isc.sans.edu/forums/diary/16985 [Third Party Advisory]
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19089 [Third Party Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2013-3918
- ... 외 1건
This product uses the NVD API but is not endorsed or certified by the NVD.