Operating System:

[Win]

Published:

09 October 2013

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.1410
        Vulnerability in Windows Common Control Library Could Allow
                      Remote Code Execution (2864058)
                              9 October 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Microsoft Windows
Publisher:         Microsoft
Operating System:  Windows XP
                   Windows Server 2003
                   Windows Vista
                   Windows Server 2008
                   Windows 7
                   Windows Server 2008 R2
                   Windows 8
                   Windows Server 2012
                   Windows RT
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-3195  

Original Bulletin: 
   https://technet.microsoft.com/en-us/security/bulletin/ms13-083

- --------------------------BEGIN INCLUDED TEXT--------------------

Microsoft Security Bulletin MS13-083 - Critical

Vulnerability in Windows Common Control Library Could Allow Remote Code 
Execution (2864058)

Published: Tuesday, October 08, 2013

Version: 1.0

General Information

Executive Summary

This security update resolves a privately reported vulnerability in Microsoft 
Windows. The vulnerability could allow remote code execution if an attacker 
sends a specially crafted web request to an ASP.NET web application running on 
an affected system. An attacker could exploit this vulnerability without 
authentication to run arbitrary code.

This security update is rated Critical for all supported 64-bit editions of 
Microsoft Windows. This security update has no severity rating for Windows RT 
and for all supported 32-bit editions of Windows Server 2003, Windows Vista, 
Windows Server 2008, Windows 7, and Windows 8.

Affected Software 

Windows XP
Windows Server 2003
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8
Windows Server 2012
Windows RT

Vulnerability Information

Comctl32 Integer Overflow Vulnerability - CVE-2013-3195

A remote code execution vulnerability exists in the way that the Windows 
common control library handles allocating memory for data structures. The 
vulnerability could allow remote code execution if an attacker sends a 
specially crafted web request to an ASP.NET web application running on an 
affected system.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=QLCr
-----END PGP SIGNATURE-----