CVE-2013-3906

HIGH
2013-11-06 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 26, 2026 - 11:18 vuln.today
Patch Released
Oct 22, 2025 - 01:15 nvd
Patch available
PoC Detected
Oct 22, 2025 - 01:15 vuln.today
Public exploit code
Added to CISA KEV
Oct 22, 2025 - 01:15 cisa
CISA KEV
CVE Published
Nov 06, 2013 - 15:55 nvd
HIGH 7.8

Description

GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013.

Analysis

GDI+ in Microsoft Windows and Office fails to properly handle TIFF images, allowing remote code execution through crafted documents, actively exploited in targeted attacks against Pakistani and Middle Eastern organizations.

Technical Context

The CWE-94 vulnerability in GDI+'s TIFF codec allows specially crafted TIFF images to trigger code execution when rendered by any application using GDI+ (including Office, Lync, and Windows Photo Viewer). Attackers embedded exploit TIFF images in Word documents for delivery.

Affected Products

['Microsoft Windows Vista SP2', 'Microsoft Windows Server 2008 SP2', 'Microsoft Office 2003 SP3', 'Microsoft Office 2007 SP3', 'Microsoft Office 2010 SP1/SP2', 'Microsoft Lync 2010/2013']

Remediation

Apply Microsoft security update MS13-096. Disable TIFF rendering via the TIFF codec workaround. Block documents with embedded TIFF images at the email gateway.

Priority Score

69
Low Medium High Critical
KEV: +50
EPSS: +92.6
CVSS: +39
POC: +20

Share

CVE-2013-3906 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy