MS13-054: Vulnerability in GDI+ Could Allow Remote Code Execution (2848295)

high Nessus Plugin ID 67211

Synopsis

The remote Windows host has a remote code execution vulnerability.

Description

The version of Microsoft's GDI+ subsystem installed on the remote host has an unspecified code execution vulnerability. Specially crafted TrueType font files are not processed properly. A remote, unauthenticated attacker could exploit this vulnerability by getting a user to view content that contains malicious TrueType font files, resulting in arbitrary code execution.

Solution

Microsoft has released a set of patches for Windows, Office 2003, Office 2007, Office 2010, Lync 2010, Lync 2010 Attendee, Lync 2013, and Lync Basic 2013.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2013/ms13-054

Plugin Details

Severity: High

ID: 67211

File Name: smb_nt_ms13-054.nasl

Version: 1.14

Type: local

Agent: windows

Published: 7/10/2013

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 7/9/2013

Vulnerability Publication Date: 7/9/2013

Reference Information

CVE: CVE-2013-3129

BID: 60978

IAVA: 2013-A-0135

MSFT: MS13-054

MSKB: 2687276, 2687309, 2817465, 2817480, 2834886, 2835361, 2835364, 2843160, 2843162, 2843163, 2856545