CVE-2025-53766 (CNNVD-202508-1241)

CRITICAL
中文标题:
Microsoft Windows GDI+ 安全漏洞
英文标题:
GDI+ Remote Code Execution Vulnerability
CVSS分数: 9.8
发布时间: 2025-08-12 17:10:37
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Microsoft Windows GDI+是美国微软(Microsoft)公司的一个Windows操作操作系统的图形设备接口。该软件是.NET框架的组成部分,负责在屏幕和打印机上绘制图形图像和显示信息。 Microsoft Windows GDI+存在安全漏洞。攻击者利用该漏洞可以执行代码。以下产品和版本受到影响:Windows Server 2019,Windows Server 2019 (Server Core installation),Windows Server 2022,Windows Server 2022 (Server Core installation),Windows 10 Version 21H2 for 32-bit Systems,Windows 10 Version 21H2 for ARM64-based Systems,Windows 10 Version 21H2 for x64-based Systems,Windows 11 Version 22H2 for ARM64-based Systems,Windows 11 Version 22H2 for x64-based Systems,Windows 10 Version 22H2 for x64-based Systems,Windows 10 Version 22H2 for ARM64-based Systems,Windows 10 Version 22H2 for 32-bit Systems,Windows Server 2025 (Server Core installation),Windows 11 Version 23H2 for ARM64-based Systems,Windows 11 Version 23H2 for x64-based Systems,Windows Server 2022, 23H2 Edition (Server Core installation),Windows 11 Version 24H2 for ARM64-based Systems,Windows 11 Version 24H2 for x64-based Systems,Windows Server 2025,Windows 10 for 32-bit Systems,Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 for x64-based Systems,Windows 10 Version 1607 for 32-bit Systems,Windows 10 Version 1607 for x64-based Systems,Windows Server 2016,Windows Server 2016 (Server Core installation),Windows Server 2008 for 32-bit Systems Service Pack 2,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2,Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based Systems Service Pack 1,Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),Windows Server 2012,Windows Server 2012 (Server Core installation),Windows Server 2012 R2,Windows Server 2012 R2 (Server Core installation),Microsoft Office for Android,Microsoft Office for Universal。

英文描述:

NOT_EXTRACTED

CWE类型:
CWE-122
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Microsoft Windows 10 Version 1809 - < 10.0.17763.7678 - cpe:2.3:a:microsoft:windows_10_version_1809:*:*:*:*:*:*:*:*
Microsoft Windows Server 2019 - < 10.0.17763.7678 - cpe:2.3:a:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
Microsoft Windows Server 2019 (Server Core installation) - < 10.0.17763.7678 - cpe:2.3:a:microsoft:windows_server_2019_(server_core_installation):*:*:*:*:*:*:*:*
Microsoft Windows Server 2022 - < 10.0.20348.4052 - cpe:2.3:a:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
Microsoft Windows 10 Version 21H2 - < 10.0.19044.6216 - cpe:2.3:a:microsoft:windows_10_version_21h2:*:*:*:*:*:*:*:*
Microsoft Windows 11 version 22H2 - < 10.0.22621.5768 - cpe:2.3:a:microsoft:windows_11_version_22h2:*:*:*:*:*:*:*:*
Microsoft Windows 10 Version 22H2 - < 10.0.19045.6216 - cpe:2.3:a:microsoft:windows_10_version_22h2:*:*:*:*:*:*:*:*
Microsoft Windows Server 2025 (Server Core installation) - < 10.0.26100.4946 - cpe:2.3:a:microsoft:windows_server_2025_(server_core_installation):*:*:*:*:*:*:*:*
Microsoft Windows 11 version 22H3 - < 10.0.22631.5768 - cpe:2.3:a:microsoft:windows_11_version_22h3:*:*:*:*:*:*:*:*
Microsoft Windows 11 Version 23H2 - < 10.0.22631.5768 - cpe:2.3:a:microsoft:windows_11_version_23h2:*:*:*:*:*:*:*:*
Microsoft Windows Server 2022, 23H2 Edition (Server Core installation) - < 10.0.25398.1791 - cpe:2.3:a:microsoft:windows_server_2022,_23h2_edition_(server_core_installation):*:*:*:*:*:*:*:*
Microsoft Windows 11 Version 24H2 - < 10.0.26100.4946 - cpe:2.3:a:microsoft:windows_11_version_24h2:*:*:*:*:*:*:*:*
Microsoft Windows Server 2025 - < 10.0.26100.4946 - cpe:2.3:a:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
Microsoft Windows 10 Version 1507 - < 10.0.10240.21100 - cpe:2.3:a:microsoft:windows_10_version_1507:*:*:*:*:*:*:*:*
Microsoft Windows 10 Version 1607 - < 10.0.14393.8330 - cpe:2.3:a:microsoft:windows_10_version_1607:*:*:*:*:*:*:*:*
Microsoft Windows Server 2016 - < 10.0.14393.8330 - cpe:2.3:a:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
Microsoft Windows Server 2016 (Server Core installation) - < 10.0.14393.8330 - cpe:2.3:a:microsoft:windows_server_2016_(server_core_installation):*:*:*:*:*:*:*:*
Microsoft Windows Server 2008 Service Pack 2 - < 6.0.6003.23471 - cpe:2.3:a:microsoft:windows_server_2008_service_pack_2:*:*:*:*:*:*:*:*
Microsoft Windows Server 2008 Service Pack 2 (Server Core installation) - < 6.0.6003.23471 - cpe:2.3:a:microsoft:windows_server_2008_service_pack_2_(server_core_installation):*:*:*:*:*:*:*:*
Microsoft Windows Server 2008 R2 Service Pack 1 - < 6.1.7601.27872 - cpe:2.3:a:microsoft:windows_server_2008_r2_service_pack_1:*:*:*:*:*:*:*:*
Microsoft Windows Server 2008 R2 Service Pack 1 (Server Core installation) - < 6.1.7601.27872 - cpe:2.3:a:microsoft:windows_server_2008_r2_service_pack_1_(server_core_installation):*:*:*:*:*:*:*:*
Microsoft Windows Server 2012 - < 6.2.9200.25622 - cpe:2.3:a:microsoft:windows_server_2012:*:*:*:*:*:*:*:*
Microsoft Windows Server 2012 (Server Core installation) - < 6.2.9200.25622 - cpe:2.3:a:microsoft:windows_server_2012_(server_core_installation):*:*:*:*:*:*:*:*
Microsoft Windows Server 2012 R2 - < 6.3.9600.22725 - cpe:2.3:a:microsoft:windows_server_2012_r2:*:*:*:*:*:*:*:*
Microsoft Windows Server 2012 R2 (Server Core installation) - < 6.3.9600.22725 - cpe:2.3:a:microsoft:windows_server_2012_r2_(server_core_installation):*:*:*:*:*:*:*:*
Microsoft Microsoft Office for Android - < 16.0.19127.20000 - cpe:2.3:a:microsoft:microsoft_office_for_android:*:*:*:*:*:*:*:*
Microsoft Microsoft Office for Universal - < 16.0.14326.22618 - cpe:2.3:a:microsoft:microsoft_office_for_universal:*:*:*:*:*:*:*:*
microsoft office * - - cpe:2.3:a:microsoft:office:*:*:*:*:*:universal:*:*
microsoft windows_10_1507 * - - cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*
microsoft windows_10_1607 * - - cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*
microsoft windows_10_1809 * - - cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*
microsoft windows_10_21h2 * - - cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*
microsoft windows_10_22h2 * - - cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*
microsoft windows_11_22h2 * - - cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*
microsoft windows_11_23h2 * - - cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*
microsoft windows_11_24h2 * - - cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*
microsoft windows_server_2008 - - - cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*
microsoft windows_server_2008 r2 - - cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
microsoft windows_server_2012 - - - cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
microsoft windows_server_2012 r2 - - cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
microsoft windows_server_2016 * - - cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
microsoft windows_server_2019 * - - cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
microsoft windows_server_2022 * - - cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
microsoft windows_server_2022_23h2 * - - cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*
microsoft windows_server_2025 * - - cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
GDI+ Remote Code Execution Vulnerability vendor-advisory
cve.org
访问
CVSS评分详情
3.1 (cna)
CRITICAL
9.8
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2025-08-12 17:10:37
修改时间:
2025-11-10 00:12:42
创建时间:
2025-11-11 15:40:41
更新时间:
2025-11-11 16:00:04
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-53766 2025-11-11 15:23:28 2025-11-11 07:40:41
NVD nvd_CVE-2025-53766 2025-11-11 15:00:59 2025-11-11 07:48:29
CNNVD cnnvd_CNNVD-202508-1241 2025-11-11 15:12:53 2025-11-11 08:00:04
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 16:00:04
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202508-1241; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-202508-1241
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:48:29
affected_products_count: 27 → 45; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 27 -> 45
  • data_sources: ['cve'] -> ['cve', 'nvd']