Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-3196

EPSS 1.28% · P80
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2013-3196

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The NT Virtual DOS Machine (NTVDM) subsystem in the kernel in Microsoft Windows XP SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 on 32-bit platforms does not properly validate kernel-memory addresses, which allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Windows Kernel Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3197 and CVE-2013-3198.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Windows 内核内存损坏漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。 Windows内核中存在特权提升漏洞,该漏洞源于NT DOS虚拟机(NTVDM)中的内存损坏情形。成功利用这些漏洞的攻击者可以在内核模式下运行任意代码。攻击者可随后安装程序;查看、更改或删除数据;或者创建拥有完全用户权限的新帐户。以下系统版本受到影响:Microsoft Windows XP SP3,Windows Server 2003 SP2,Windows Vista SP2,Windows Server
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2013-3196

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2013-3196

Please Login to view more intelligence information

Same Patch Batch · n/a · 2013-08-14 · 24 CVEs total

CVE-2013-3186Internet Explorer 进程完整性级别分配漏洞
CVE-2013-3199Internet Explorer 内存损坏漏洞
CVE-2013-3198Windows 内核内存损坏漏洞
CVE-2013-3197Windows 内核内存损坏漏洞
CVE-2013-3194Internet Explorer 内存损坏漏洞
CVE-2013-3193Internet Explorer 内存损坏漏洞
CVE-2013-3192Internet Explorer EUC-JP 字符编码漏洞
CVE-2013-3191Internet Explorer 内存损坏漏洞
CVE-2013-3190Internet Explorer 内存损坏漏洞
CVE-2013-3189Internet Explorer 内存损坏漏洞
CVE-2013-3188Internet Explorer 内存损坏漏洞
CVE-2013-3187Internet Explorer 内存损坏漏洞
CVE-2013-2078Xen 远程拒绝服务漏洞
CVE-2013-3185Microsoft Active Directory Federation Services 信息泄露漏洞
CVE-2013-3184Internet Explorer 内存损坏漏洞
CVE-2013-3183Microsoft TCP/IP堆栈 ICMPv6 拒绝服务漏洞
CVE-2013-3182Windows NAT 拒绝服务漏洞
CVE-2013-3181Microsoft Windows Uniscribe 字体分析引擎内存损坏漏洞
CVE-2013-3175Windows 远程过程调用漏洞
CVE-2013-5121PHPFox SQL注入漏洞

Showing top 20 of 24 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2013-3196

No comments yet


Leave a comment