CVE-2013-3918
critical-risk
Published 2013-11-12
The InformationCardSigninHelper Class ActiveX control in icardie.dll in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via a crafted web page that is accessed by Internet Explorer, as exploited in the wild in November 2013, aka "InformationCardSigninHelper Vulnerability."
Do I need to act?
!
87.0% chance of exploitation in next 30 days
EPSS score — higher than 13% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (14)
Affected Vendors
References (16)
Third Party Advisory
http://blogs.technet.com/b/msrc/archive/2013/11/11/activex-control-issue-being-a...
Third Party Advisory
http://www.fireeye.com/blog/technical/2013/11/new-ie-zero-day-found-in-watering-...
Third Party Advisory
http://www.us-cert.gov/ncas/alerts/TA13-317A
Third Party Advisory
https://isc.sans.edu/forums/diary/16985
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3...
Third Party Advisory
http://blogs.technet.com/b/msrc/archive/2013/11/11/activex-control-issue-being-a...
Third Party Advisory
http://www.fireeye.com/blog/technical/2013/11/new-ie-zero-day-found-in-watering-...
Third Party Advisory
http://www.us-cert.gov/ncas/alerts/TA13-317A
Third Party Advisory
https://isc.sans.edu/forums/diary/16985
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3...
82
/ 100
critical-risk
Severity
30/34 · Critical
Exploitability
34/34 · Critical
Exposure
18/34 · Moderate