Language:
https://www.zerodayinitiative.com/advisories/ZDI-13-162/
https://www.zerodayinitiative.com/advisories/ZDI-13-163/
https://www.zerodayinitiative.com/advisories/ZDI-13-164/
https://www.zerodayinitiative.com/advisories/ZDI-13-165/
https://www.zerodayinitiative.com/advisories/ZDI-13-166/
https://www.zerodayinitiative.com/advisories/ZDI-13-167/
https://www.zerodayinitiative.com/advisories/ZDI-13-172/
https://www.zerodayinitiative.com/advisories/ZDI-13-173/
https://www.zerodayinitiative.com/advisories/ZDI-13-174/
https://www.zerodayinitiative.com/advisories/ZDI-13-175/
https://www.zerodayinitiative.com/advisories/ZDI-13-176/
https://www.zerodayinitiative.com/advisories/ZDI-13-231/
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2013/ms13-055
Severity: High
ID: 67212
File Name: smb_nt_ms13-055.nasl
Version: 1.23
Type: local
Agent: windows
Family: Windows : Microsoft Bulletins
Published: 7/10/2013
Updated: 3/30/2023
Supported Sensors: Nessus
Risk Factor: Critical
Score: 9.4
Risk Factor: High
Base Score: 9.3
Temporal Score: 8.1
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: cpe:/a:microsoft:ie, cpe:/o:microsoft:windows
Required KB Items: SMB/MS_Bulletin_Checks/Possible
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 7/9/2013
Vulnerability Publication Date: 7/9/2013
CISA Known Exploited Vulnerability Due Dates: 4/20/2023
Core Impact
Metasploit (MS13-055 Microsoft Internet Explorer CAnchorElement Use-After-Free)
CVE: CVE-2013-3115, CVE-2013-3143, CVE-2013-3144, CVE-2013-3145, CVE-2013-3146, CVE-2013-3147, CVE-2013-3148, CVE-2013-3149, CVE-2013-3150, CVE-2013-3151, CVE-2013-3152, CVE-2013-3153, CVE-2013-3161, CVE-2013-3162, CVE-2013-3163, CVE-2013-3164, CVE-2013-3166, CVE-2013-3846, CVE-2013-4015
BID: 60968, 60969, 60970, 60971, 60972, 60941, 60957, 60962, 60963, 60964, 60965, 60966, 60967, 60973, 60974, 60975, 60976, 61482, 62372, 62376
MSFT: MS13-055
MSKB: 2846071