7.6
CVSSv2

CVE-2013-3900

Published: 11/12/2013 Updated: 02/11/2022
CVSS v2 Base Score: 7.6 | Impact Score: 10 | Exploitability Score: 4.9
VMScore: 679
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

The WinVerifyTrust function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly validate PE file digests during Authenticode signature verification, which allows remote malicious users to execute arbitrary code via a crafted PE file, aka "WinVerifyTrust Signature Validation Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows xp -

microsoft windows server 2008 r2

microsoft windows server 2012 r2

microsoft windows 10 1607

microsoft windows 8.1 -

microsoft windows server 2016 -

microsoft windows server 2008 -

microsoft windows 7 -

microsoft windows rt 8.1 -

microsoft windows 11 -

microsoft windows server 2022 -

microsoft windows server 2019 -

microsoft windows 10 -

microsoft windows 10 21h2

microsoft windows 10 20h2

microsoft windows 10 21h1

microsoft windows 10 1909

microsoft windows 10 1809

microsoft windows server 2012 -

microsoft windows server 2003 -

microsoft windows vista -

Github Repositories

Weaponized HellsGate/SigFlip

SignatureGate Weaponized version of HellsGate, bypassing AV/EDR/EPPs by abusing opt-in-fix CVE-2013-3900 Most code is from githubcom/am0nsec/SharpHellsGate and githubcom/med0x2e/SigFlip Disclaimer: The information/files provided in this repository are strictly intended for educational and ethical purposes only The techniques and tools are intended to be use

NESSUS-Vulnerability Management Description In this lab I will cover vulnerability scanning and vulnerability remediation I will be using Nessus Essentials to scan local VMs hosted on VMWare Workstation in order run credentialed scans to discover vulnerabilities, remediate some of the vulnerabilities, then perform a rescan to verify remediation Technologies Used VMWare Works

Proof of concept code for injecting content into MSI files without breaking Authenticode

MsiAuthenticodeInject This project demonstrates a proof of concept bypass to Microsoft's optional patch of CVE-2013-3900 How it works? Microsoft's MSI files have Authenticode signatures stored in their \x05DigitalSignature entry Using the same strategy used in CVE-2013-3900, we can append data to the end of the stream, updating the relevant fields from the MSI (size

Packer template for Windows Server 2019 UEFI and secure boot using vSphere-ISO provider Note: this code is compatible with Packer v19x or later This repository contains HashiCorp Packer templates to deploy Windows Server 2019 UEFI and secure boot in VMware vSphere (with vCenter), using the vsphere-iso builder These templates creates the Template (or VM) directly on the vSph

Fix WinVerifyTrust Signature Validation Vulnerability, CVE-2013-3900, QID-378332

Fix-WinVerifyTrustSignatureValidationVuln Fix WinVerifyTrust Signature Validation Vulnerability, CVE-2013-39001, QID-3783322 This Fix is intended for 64-bit Windows Computers This PowerShell code is one way to fix the vulnerability - aside from creating a reg file and using reg import <filereg> to import the new registry key Full Packaged Script: If HKLM:\Softw

Proof of concept code for injecting content into MSI files without breaking Authenticode

MsiAuthenticodeInject This project demonstrates a proof of concept bypass to Microsoft's optional patch of CVE-2013-3900 How it works? Microsoft's MSI files have Authenticode signatures stored in their \x05DigitalSignature entry Using the same strategy used in CVE-2013-3900, we can append data to the end of the stream, updating the relevant fields from the MSI (size

Append a custom data payload to a digitally signed NSIS .exe installer

Append Payload to Signed NSIS Executable Installer File This program allows you to embed a payload containing custom user data into an executable generated by NSIS (Nullsoft Scripted Installer System) and signed with Microsoft SignToolexe (or similar) This is tested and working with the NSIS ReadCustomerData Function Windows recognizes the original digital signature since we

Vulnerability Management Description The project consists of vulnerability scanning and vulnerability remediation These are two of the main steps in the Vulnerability Management Lifecycle I will use Nessus Essentials to scan local VMs hosted on VMWare Workstation to run credentialed scans to discover vulnerabilities, research, and remediate vulnerabilities, then perform a res

WinVerifyTrust Signature Mitigation Script This script can be deployed to mitigate the issue with CVE-2013-3900 Microsoft MSRC Script adds two registry keys and a dword key, if the machine is x64 it will double this

The objective of this lab exercise was to improve my familiarity with Vulnerability Management I chose Nessus to do this lab because I already had some experience with Nessus during my time at University and with TryHackme, so I wanted to further my skills on Nessus The setup featured Nessus Essentials software, VMWare Workstation Player, and a Windows 10 ISO I followed the