ID CVE-2013-3888
Summary dxgkrnl.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "DirectX Graphics Kernel Subsystem Double Fetch Vulnerability."
References
Vulnerable Configurations
  • cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_vista:*:sp2:x64:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_vista:*:sp2:x64:*:*:*:*:*
CVSS
Base: 7.2 (as of 28-09-2020 - 12:58)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:C/I:C/A:C
msbulletin via4
bulletin_id MS13-081
bulletin_url
date 2013-10-08T00:00:00
impact Remote Code Execution
knowledgebase_id 2870008
knowledgebase_url
severity Critical
title Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution
oval via4
accepted 2013-11-26T13:49:17.033-05:00
class vulnerability
contributors
  • name SecPod Team
    organization SecPod Technologies
  • name Sharath S
    organization SecPod Technologies
definition_extensions
  • comment Microsoft Windows Vista (32-bit) Service Pack 2 is installed
    oval oval:org.mitre.oval:def:6124
  • comment Microsoft Windows Vista x64 Edition Service Pack 2 is installed
    oval oval:org.mitre.oval:def:5594
  • comment Microsoft Windows Server 2008 (32-bit) Service Pack 2 is installed
    oval oval:org.mitre.oval:def:5653
  • comment Microsoft Windows Server 2008 x64 Edition Service Pack 2 is installed
    oval oval:org.mitre.oval:def:6216
  • comment Microsoft Windows Server 2008 Itanium-Based Edition Service Pack 2 is installed
    oval oval:org.mitre.oval:def:6150
  • comment Microsoft Windows 7 (32-bit) Service Pack 1 is installed
    oval oval:org.mitre.oval:def:12292
  • comment Microsoft Windows 7 x64 Service Pack 1 is installed
    oval oval:org.mitre.oval:def:12627
  • comment Microsoft Windows Server 2008 R2 x64 Service Pack 1 is installed
    oval oval:org.mitre.oval:def:12567
  • comment Microsoft Windows Server 2008 R2 Itanium-Based Edition Service Pack 1 is installed
    oval oval:org.mitre.oval:def:12583
description dxgkrnl.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "DirectX Graphics Kernel Subsystem Double Fetch Vulnerability."
family windows
id oval:org.mitre.oval:def:18924
status accepted
submitted 2013-10-15T15:40:52
title DirectX Graphics Kernel Subsystem Double Fetch Vulnerability (CVE-2013-3888) - MS13-081
version 47
refmap via4
cert TA13-288A
Last major update 28-09-2020 - 12:58
Published 09-10-2013 - 14:53
Last modified 28-09-2020 - 12:58
Back to Top