語系:
https://www.zerodayinitiative.com/advisories/ZDI-13-172/
https://www.zerodayinitiative.com/advisories/ZDI-13-173/
https://www.zerodayinitiative.com/advisories/ZDI-13-174/
https://www.zerodayinitiative.com/advisories/ZDI-13-175/
https://www.zerodayinitiative.com/advisories/ZDI-13-176/
https://www.zerodayinitiative.com/advisories/ZDI-13-231/
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2013/ms13-055
https://www.zerodayinitiative.com/advisories/ZDI-13-162/
https://www.zerodayinitiative.com/advisories/ZDI-13-163/
https://www.zerodayinitiative.com/advisories/ZDI-13-164/
https://www.zerodayinitiative.com/advisories/ZDI-13-165/
嚴重性: High
ID: 67212
檔案名稱: smb_nt_ms13-055.nasl
版本: 1.23
類型: local
代理程式: windows
已發布: 2013/7/10
已更新: 2023/3/30
支援的感應器: Nessus
風險因素: Critical
分數: 9.4
風險因素: High
基本分數: 9.3
時間分數: 8.1
媒介: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: cpe:/a:microsoft:ie, cpe:/o:microsoft:windows
必要的 KB 項目: SMB/MS_Bulletin_Checks/Possible
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2013/7/9
弱點發布日期: 2013/7/9
CISA 已知遭惡意利用弱點到期日: 2023/4/20
Core Impact
Metasploit (MS13-055 Microsoft Internet Explorer CAnchorElement Use-After-Free)
CVE: CVE-2013-3115, CVE-2013-3143, CVE-2013-3144, CVE-2013-3145, CVE-2013-3146, CVE-2013-3147, CVE-2013-3148, CVE-2013-3149, CVE-2013-3150, CVE-2013-3151, CVE-2013-3152, CVE-2013-3153, CVE-2013-3161, CVE-2013-3162, CVE-2013-3163, CVE-2013-3164, CVE-2013-3166, CVE-2013-3846, CVE-2013-4015
BID: 60941, 60957, 60962, 60963, 60964, 60965, 60966, 60967, 60968, 60969, 60970, 60971, 60972, 60973, 60974, 60975, 60976, 61482, 62372, 62376
MSFT: MS13-055
MSKB: 2846071