Windows GDI vulnerability could allow remote code execution
Report ID: MS201311002
Date Published: 13 November 2013
Compromise Type: remote-code-execution
Compromise From: remote
Windows Server 2003
Windows Server 2008
Windows Server 2008 R2
Windows 8 and Windows 8.1
Windows Server 2012 and Windows Server 2012 R2
Windows RT and Windows RT 8.1
A vulnerability in the Windows Graphics Device Interface (GDI) could be exploited in a way that allows an attacker to execute arbitrary code and take control of an affected system.
Microsoft has released a security update to address a remote code execution vulnerability in the Windows Graphics Device Interface (GDI). The vulnerability was caused by memory corruption that resulted when WordPad parses a Windows Write (.wri) file containing a specially crafted image.
This issue has been resolved in the latest update which introduces necessary correction in the way that GDI handles images contained in Windows Write files when opened in WordPad. Users are recommended to install this update onto their machine as a protection measure against exploit attempts.
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-089)
F-Secure Health Check
F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.