NDProxy.sys in the kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in November 2013.
References
| Link | Resource |
|---|---|
| http://technet.microsoft.com/security/advisory/2914486 | Patch Vendor Advisory |
| http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/ms-windows-local-privilege-escalation-zero-day-in-the-wild.html | Broken Link Not Applicable |
| https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-002 | Patch Vendor Advisory |
| https://www.exploit-db.com/exploits/37732/ | Exploit Third Party Advisory VDB Entry |
| http://technet.microsoft.com/security/advisory/2914486 | Patch Vendor Advisory |
| http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/ms-windows-local-privilege-escalation-zero-day-in-the-wild.html | Broken Link Not Applicable |
| https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-002 | Patch Vendor Advisory |
| https://www.exploit-db.com/exploits/37732/ | Exploit Third Party Advisory VDB Entry |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2013-5065 |
Configurations
Configuration 1 (hide)
|
History
22 Oct 2025, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 01:56
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://technet.microsoft.com/security/advisory/2914486 - Patch, Vendor Advisory | |
| References | () http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/ms-windows-local-privilege-escalation-zero-day-in-the-wild.html - Broken Link, Not Applicable | |
| References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-002 - Patch, Vendor Advisory | |
| References | () https://www.exploit-db.com/exploits/37732/ - Exploit, Third Party Advisory, VDB Entry |
24 Jul 2024, 14:29
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:* |
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:*:* cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:* |
| References | () http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/ms-windows-local-privilege-escalation-zero-day-in-the-wild.html - Broken Link, Not Applicable | |
| References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-002 - Patch, Vendor Advisory | |
| References | () https://www.exploit-db.com/exploits/37732/ - Exploit, Third Party Advisory, VDB Entry | |
| CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
| CWE | NVD-CWE-noinfo |
Information
Published : 2013-11-28 00:55
Updated : 2025-10-22 01:15
NVD link : CVE-2013-5065
Mitre link : CVE-2013-5065
CVE.ORG link : CVE-2013-5065
JSON object : View
Products Affected
microsoft
- windows_2003_server
- windows_xp
CWE
