MS13-096: Vulnerability in Microsoft Graphics Component Could Allow Remote Code Execution (2908005)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has a remote code execution vulnerability.

Description :

The version of Microsoft's Graphics Component installed on the remote
host is affected by a heap overflow vulnerability. Specially crafted
TrueType font files are not processed properly. A remote,
unauthenticated attacker could exploit this vulnerability by getting a
user to view content that contains malicious TrueType font files,
resulting in arbitrary code execution.

Note that this issue is currently being exploited by malware in the
wild.

See also :

http://www.nessus.org/u?55e970ce
http://technet.microsoft.com/en-us/security/bulletin/ms13-096

Solution :

Microsoft has released a set of patches for Windows 2008, Windows
Vista, Office 2003, Office 2007, Office 2010, Office Compatibility
Pack, Lync 2010, Lync 2010 Attendee, Lync 2013, and Lync Basic 2013.

Note: KB2896666 was previously released for this issue. The fix for
KB2896666 can be removed after applying MS13-096 in order to view TIFF
files.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 71311 ()

Bugtraq ID: 63530

CVE ID: CVE-2013-3906