Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5; Silverlight 5 before 5.1.20513.0; win32k.sys in the kernel-mode drivers, and GDI+, DirectWrite, and Journal, in Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT; GDI+ in Office 2003 SP3, 2007 SP3, and 2010 SP1; GDI+ in Visual Studio .NET 2003 SP1; and GDI+ in Lync 2010, 2010 Attendee, 2013, and Basic 2013 allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka "TrueType Font Parsing Vulnerability."
Subscriptions
| Vendors | Products |
|---|---|
|
Microsoft
Subscribe
|
.net Framework
Subscribe
Lync
Subscribe
Lync Basic
Subscribe
Office
Subscribe
Silverlight
Subscribe
Visual Studio .net
Subscribe
Windows 7
Subscribe
Windows 8
Subscribe
Windows Rt
Subscribe
Windows Server 2003
Subscribe
Windows Server 2008
Subscribe
Windows Server 2012
Subscribe
Windows Vista
Subscribe
Windows Xp
Subscribe
|
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 16 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2025-01-16T20:26:50.042Z
Reserved: 2013-04-17T00:00:00.000Z
Link: CVE-2013-3129
Updated: 2024-08-06T16:00:09.955Z
Status : Deferred
Published: 2013-07-10T03:46:09.810
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-3129
No data.
OpenCVE Enrichment
No data.
Weaknesses