Vulnerability Details : CVE-2013-3956
Public exploit exists!
The NICM.SYS kernel driver 3.1.11.0 in Novell Client 4.91 SP5 on Windows XP and Windows Server 2003; Novell Client 2 SP2 on Windows Vista and Windows Server 2008; and Novell Client 2 SP3 on Windows Server 2008 R2, Windows 7, Windows 8, and Windows Server 2012 allows local users to gain privileges via a crafted 0x143B6B IOCTL call.
Products affected by CVE-2013-3956
- cpe:2.3:a:novell:client:4.91:sp5:*:*:*:*:*:*When used together with: Microsoft » Windows 2003 ServerWhen used together with: Microsoft » Windows Xp
- cpe:2.3:a:novell:client:2.0:sp2:*:*:*:*:*:*When used together with: Microsoft » Windows Vista
- cpe:2.3:a:novell:client:2.0:sp3:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-3956
0.96%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 83 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2013-3956
-
Novell Client 2 SP3 nicm.sys Local Privilege Escalation
Disclosure Date: 2013-05-22First seen: 2020-04-26exploit/windows/local/novell_client_nicmThis module exploits a flaw in the nicm.sys driver to execute arbitrary code in kernel space. The vulnerability occurs while handling ioctl requests with code 0x143B6B, where a user provided pointer is used as function pointer. The module has been tes
CVSS scores for CVE-2013-3956
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2013-3956
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-3956
-
http://www.exploit-db.com/exploits/26452
Novell Client 2 SP3 - 'nicm.sys' Local Privilege Escalation (Metasploit) - Windows_x86 local Exploit
-
http://pastebin.com/GB4iiEwR
Pastebin.com - Heavy Load Warning :(Exploit
-
http://www.novell.com/support/kb/doc.php?id=7012497
Security Vulnerability - May 2013 Novell Client for Windows Zero Day disclosuresVendor Advisory
-
http://www.exploit-db.com/exploits/27191
Novell Client 2 SP3 - 'nicm.sys 3.1.11.0' Local Privilege Escalation - Windows local Exploit
Jump to