MS13-054: Vulnerability in GDI+ Could Allow Remote Code Execution (2848295)

High Nessus Plugin ID 67211


The remote Windows host has a remote code execution vulnerability.


The version of Microsoft's GDI+ subsystem installed on the remote host has an unspecified code execution vulnerability. Specially crafted TrueType font files are not processed properly. A remote, unauthenticated attacker could exploit this vulnerability by getting a user to view content that contains malicious TrueType font files, resulting in arbitrary code execution.


Microsoft has released a set of patches for Windows, Office 2003, Office 2007, Office 2010, Lync 2010, Lync 2010 Attendee, Lync 2013, and Lync Basic 2013.

See Also

Plugin Details

Severity: High

ID: 67211

File Name: smb_nt_ms13-054.nasl

Version: $Revision: 1.12 $

Type: local

Agent: windows

Published: 2013/07/10

Modified: 2017/07/26

Dependencies: 57033, 27524, 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/07/09

Vulnerability Publication Date: 2013/07/09

Reference Information

CVE: CVE-2013-3129

BID: 60978

OSVDB: 94960

MSFT: MS13-054

MSKB: 2687276, 2687309, 2817465, 2817480, 2834886, 2835361, 2835364, 2843160, 2843162, 2843163, 2856545

IAVA: 2013-A-0135