CERT-In Vulnerability Note
CIVN-2013-0198
Microsoft Graphics Component Remote Code Execution Vulnerability
Original Issue Date:November 13, 2013
Severity Rating: HIGH
Systems Affected
- Windows XP SP 3, Professional x64 Edition SP 2
- Windows Server 2003 SP 2, x64 Edition SP 2 & Itanium-based Systems SP2
- Windows Vista SP 2 & x64 Edition SP 2
- Windows Server 2008 for 32-bit Systems SP 2, x64-based Systems SP 2 & Itanium-based Systems SP 2
- Windows 7 for 32-bit Systems SP 1 & x64-based Systems SP 1
- Windows Server 2008 R2 for x64-based Systems SP 1 & Itanium-based Systems SP 1
- Windows 8 for 32-bit Systems & x64-based Systems
- Windows 8.1 for 32-bit & x64-based Systems
- Windows Server 2012
- Windows Server 2012 R2
- Windows RT
- Windows RT 8.1
Overview
A remote code execution vulnerability has been reported in Microsoft Graphics Component (GDI), which could allow a remote attacker to execute arbitrary code on the targeted system.
Description
A remote code execution vulnerability exists in the Windows Graphics Device Interface (GDI) due to improper memory operations while processing crafted Windows Write (.wri) files. An unauthenticated, remote attacker could exploit this vulnerability by enticing a user to view a specially crafted Windows Write document file in WordPad, resulting in memory corruption.
Successful exploitation of this vulnerability could allow execution of arbitrary code on the targeted system in the security context of the logged-in user.
Workaround
- Disable the Word 6 converter by restricting access to mswrd8.wpc
- Do not open Windows Write (.wri) documents that you receive from untrusted sources or that you receive unexpectedly from trusted sources.
Solution
Apply appropriate updates as mentioned in the Microsoft Security Bulletin
MS13-089
Vendor Information
Microsoft
https://technet.microsoft.com/en-us/security/bulletin/ms13-089
References
Microsoft
https://technet.microsoft.com/en-us/security/bulletin/ms13-089
CISCO
http://tools.cisco.com/security/center/viewAlert.x?alertId=31624
Secunia
http://secunia.com/advisories/50000/
Security Focus
http://www.securityfocus.com/bid/63546
CVE Name
CVE-2013-3940
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|