MS13-054: Vulnerability in GDI+ Could Allow Remote Code Execution (2848295)

This script is Copyright (C) 2013-2017 Tenable Network Security, Inc.

Synopsis :

The remote Windows host has a remote code execution vulnerability.

Description :

The version of Microsoft's GDI+ subsystem installed on the remote host
has an unspecified code execution vulnerability. Specially crafted
TrueType font files are not processed properly. A remote,
unauthenticated attacker could exploit this vulnerability by getting a
user to view content that contains malicious TrueType font files,
resulting in arbitrary code execution.

See also :

Solution :

Microsoft has released a set of patches for Windows, Office 2003,
Office 2007, Office 2010, Lync 2010, Lync 2010 Attendee, Lync 2013,
and Lync Basic 2013.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 67211 ()

Bugtraq ID: 60978

CVE ID: CVE-2013-3129

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now