Executive Summary

Summary
Title Vulnerability in GDI+ Could Allow Remote Code Execution
Informations
Name MS13-054 First vendor Publication 2013-07-09
Vendor Microsoft Last vendor Modification 2013-12-16
Severity (Vendor) Version Revision 1.3

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Critical
Revision Note: V1.3 (December 16, 2013): Revised bulletin to announce a detection change to correct an offering issue for Windows RT (2835361) and for Windows RT (2835364). This is a detection change only. There were no changes to the update files. Customers who have successfully installed the update do not need to take any action.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows, Microsoft Office, Microsoft Lync, and Microsoft Visual Studio. The vulnerability could allow remote code execution if a user views shared content that embeds TrueType font files.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS13-054

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-94 Failure to Control Generation of Code ('Code Injection')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:17323
 
Oval ID: oval:org.mitre.oval:def:17323
Title: TrueType font parsing vulnerability in Microsoft Silverlight - CVE-2013-3129, MS13-052 (Mac OS)
Description: Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5; Silverlight 5 before 5.1.20513.0; win32k.sys in the kernel-mode drivers, and GDI+, DirectWrite, and Journal, in Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT; GDI+ in Office 2003 SP3, 2007 SP3, and 2010 SP1; GDI+ in Visual Studio .NET 2003 SP1; and GDI+ in Lync 2010, 2010 Attendee, 2013, and Basic 2013 allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka "TrueType Font Parsing Vulnerability."
Family: macos Class: vulnerability
Reference(s): CVE-2013-3129
Version: 3
Platform(s): Apple Mac OS X
Apple Mac OS X Server
Product(s): Microsoft Silverlight 5 for Mac
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:17341
 
Oval ID: oval:org.mitre.oval:def:17341
Title: TrueType Font Parsing Vulnerability - CVE-2013-3129 (MS13-052, MS13-053, MS13-054)
Description: Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5; Silverlight 5 before 5.1.20513.0; win32k.sys in the kernel-mode drivers, and GDI+, DirectWrite, and Journal, in Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT; GDI+ in Office 2003 SP3, 2007 SP3, and 2010 SP1; GDI+ in Visual Studio .NET 2003 SP1; and GDI+ in Lync 2010, 2010 Attendee, 2013, and Basic 2013 allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka "TrueType Font Parsing Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-3129
Version: 23
Platform(s): Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Vista
Microsoft Windows XP
Product(s): Microsoft .NET Framework 3.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.0
Microsoft .NET Framework 4.5
Microsoft Silverlight 5
Microsoft Office 2003
Microsoft Office 2007
Microsoft Office 2010
Microsoft Lync 2010
Microsoft Lync Basic 2013
Microsoft Lync 2010 Attendee
Microsoft Visual Studio .NET 2003
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 5
Application 5
Application 2
Application 4
Application 6
Application 1
Os 2
Os 2
Os 1
Os 1
Os 3
Os 1
Os 1
Os 2

Information Assurance Vulnerability Management (IAVM)

Date Description
2013-07-11 IAVM : 2013-A-0135 - Microsoft GDI+ Remote Code Execution Vulnerability
Severity : Category II - VMSKEY : V0039199
2013-07-11 IAVM : 2013-B-0071 - Multiple Vulnerabilities in Microsoft .NET Framework and Silverlight
Severity : Category II - VMSKEY : V0039211

Nessus® Vulnerability Scanner

Date Description
2013-12-11 Name : The remote Windows host has a remote code execution vulnerability.
File : smb_nt_ms13-096.nasl - Type : ACT_GATHER_INFO
2013-07-10 Name : The .NET Framework install on the remote Windows host could allow arbitrary c...
File : smb_nt_ms13-052.nasl - Type : ACT_GATHER_INFO
2013-07-10 Name : The Windows kernel on the remote host is affected by multiple vulnerabilities.
File : smb_nt_ms13-053.nasl - Type : ACT_GATHER_INFO
2013-07-10 Name : The remote Windows host has a remote code execution vulnerability.
File : smb_nt_ms13-054.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
Date Informations
2016-04-27 02:02:15
  • Multiple Updates
2014-05-06 11:35:08
  • Multiple Updates
2014-05-06 11:33:27
  • Multiple Updates
2014-04-19 00:26:08
  • Multiple Updates
2014-04-19 00:18:10
  • Multiple Updates
2014-04-18 21:28:37
  • Multiple Updates
2014-04-18 21:19:33
  • Multiple Updates
2014-04-18 17:26:23
  • Multiple Updates
2014-04-18 17:18:34
  • Multiple Updates
2014-04-18 13:29:53
  • Multiple Updates
2014-04-18 13:19:35
  • Multiple Updates
2014-04-18 09:27:09
  • Multiple Updates
2014-04-18 09:19:07
  • Multiple Updates
2014-04-18 05:28:01
  • Multiple Updates
2014-04-18 05:20:11
  • Multiple Updates
2014-04-18 00:26:20
  • Multiple Updates
2014-04-18 00:18:15
  • Multiple Updates
2014-04-17 21:25:59
  • Multiple Updates
2014-04-17 21:19:30
  • Multiple Updates
2014-04-17 17:26:37
  • Multiple Updates
2014-04-17 17:18:27
  • Multiple Updates
2014-04-17 13:29:31
  • Multiple Updates
2014-04-17 13:19:52
  • Multiple Updates
2014-04-17 09:07:54
  • Multiple Updates
2014-02-17 11:47:42
  • Multiple Updates
2013-12-17 05:15:58
  • Multiple Updates
2013-11-11 12:41:34
  • Multiple Updates
2013-08-13 21:20:25
  • Multiple Updates
2013-08-01 21:17:29
  • Multiple Updates
2013-07-10 17:30:55
  • Multiple Updates
2013-07-10 13:22:55
  • Multiple Updates
2013-07-09 21:29:51
  • Multiple Updates
2013-07-09 21:16:35
  • First insertion