1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar

Vulnerability protection

Windows GDI vulnerability could allow remote code execution

Report ID: MS201311002
Date Published: 13 November 2013

Criticality: Critical
Compromise Type: remote-code-execution
Compromise From: remote

Affected Product/Component:

Windows XP
Windows Server 2003
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8 and Windows 8.1
Windows Server 2012 and Windows Server 2012 R2
Windows RT and Windows RT 8.1


A vulnerability in the Windows Graphics Device Interface (GDI) could be exploited in a way that allows an attacker to execute arbitrary code and take control of an affected system.

Detailed Description

Microsoft has released a security update to address a remote code execution vulnerability in the Windows Graphics Device Interface (GDI). The vulnerability was caused by memory corruption that resulted when WordPad parses a Windows Write (.wri) file containing a specially crafted image.

This issue has been resolved in the latest update which introduces necessary correction in the way that GDI handles images contained in Windows Write files when opened in WordPad. Users are recommended to install this update onto their machine as a protection measure against exploit attempts.

CVE Reference



Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-089)

Security Advisories

For a list of known vulnerabilities affecting F-Secure products and the released fixes, please refer to the Security Advisories page.