microsoft office CVE-2013-3906 vulnerability in Microsoft Products
Published on November 6, 2013

product logo product logo product logo
GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013.

Vendor Advisory NVD

Known Exploited Vulnerability

This Microsoft Graphics Component Memory Corruption Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Microsoft Graphics Component contains a memory corruption vulnerability which can allow for remote code execution.

The following remediation steps are recommended / required by August 15, 2022: Apply updates per vendor instructions.

Vulnerability Analysis

CVE-2013-3906 is exploitable with local system access, requires user interaction. This vulnerability is considered to have a low attack complexity. This vulnerability is known to be actively exploited by threat actors in an automatable fashion. The potential impact of an exploit of this vulnerability is considered to be very high.

Attack Vector:
LOCAL
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

What is a Code Injection Vulnerability?

The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.

CVE-2013-3906 has been classified to as a Code Injection vulnerability or weakness.


Products Associated with CVE-2013-3906

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2013-3906 are published in these products:

 
 
 
 
 
 
 
 
 

Exploit Probability

EPSS
92.50%
Percentile
99.73%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.