GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013.
References
Link | Resource |
---|---|
http://blogs.mcafee.com/mcafee-labs/mcafee-labs-detects-zero-day-exploit-targeting-microsoft-office-2 | Broken Link Exploit |
http://blogs.technet.com/b/srd/archive/2013/11/05/cve-2013-3906-a-graphics-vulnerability-exploited-through-word-documents.aspx | Broken Link Exploit |
http://technet.microsoft.com/security/advisory/2896666 | Patch Vendor Advisory |
http://www.exploit-db.com/exploits/30011 | Exploit Third Party Advisory VDB Entry |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-096 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2013-11-06 15:55
Updated : 2024-07-24 16:19
NVD link : CVE-2013-3906
Mitre link : CVE-2013-3906
CVE.ORG link : CVE-2013-3906
JSON object : View
Products Affected
microsoft
- excel_viewer
- office
- office_compatibility_pack
- windows_vista
- powerpoint_viewer
- word_viewer
- lync
- windows_server_2008
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')