Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to cause a denial of service (daemon hang) via a web-service request containing a crafted X.509 certificate that is not properly handled during validation, aka "Digital Signatures Vulnerability."
References
Link | Resource |
---|---|
http://www.us-cert.gov/ncas/alerts/TA13-317A | Third Party Advisory US Government Resource |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-095 | Patch Vendor Advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19112 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2013-11-13 00:55
Updated : 2024-02-28 12:00
NVD link : CVE-2013-3869
Mitre link : CVE-2013-3869
CVE.ORG link : CVE-2013-3869
JSON object : View
Products Affected
microsoft
- windows_rt
- windows_8.1
- windows_xp
- windows_server_2012
- windows_server_2008
- windows_rt_8.1
- windows_7
- windows_server_2003
- windows_vista
- windows_8
CWE
CWE-20
Improper Input Validation