Check Point Reference: | CPAI-2013-3539 |
Date Published: | 12 Nov 2013 |
Severity: | Critical |
Last Updated: | Saturday 04 January, 2025 |
Source: | CVE-2013-3901 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Windows XP Windows Server 2003 Windows Vista Windows Server 2008 Windows 7 Windows Server 2008 R2 Windows 8 and Windows 8.1 Windows Server 2012 and Windows Server 2012 R2 Windows RT and Windows RT 8.1] Server Core installation option |
Vulnerability Description | A remote code execution vulnerability has been reported in the Windows Graphics Device Interface (GDI). |
Update/Patch Avaliable | Apply patches from: MS13-089 |
Vulnerability Details | The vulnerability is caused by a memory corruption when the Windows Graphics Device Interface improperly processes a specially crafted image contained in a Windows Write (.wri) file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted Windows Write file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: Content Protection Violation
Attack Information: Microsoft Graphics Device Interface Integer Overflow (MS13-089)