Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»New GDI Flaws Could Enable Remote Code Execution in Windows
Cyber Security

New GDI Flaws Could Enable Remote Code Execution in Windows

Team-CWDBy Team-CWDNovember 3, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A set of previously unknown flaws in Windows Graphics Device Interface (GDI) that could enable remote code execution and information disclosure has been revealed after Microsoft released fixes.

These issues involve malformed enhanced metafile (EMF) and EMF+ records that can cause memory corruption during image rendering. The findings expand understanding of attack surfaces tied to Windows graphics processing.

Three vulnerabilities have now been analyzed in depth, following their inclusion in Patch Tuesday updates across May, July and August 2025.

The weaknesses were uncovered in Windows’ handling of GDI operations, particularly within GdiPlus.dll and gdi32full.dll, which process vector graphics, text and print operations.

A fuzzing campaign targeting EMF formats led directly to the discoveries.

Three Flaws Uncovered

The bugs are tracked as:

  • CVE-2025-30388, rated important and more likely to be exploited

  • CVE-2025-53766, rated critical and enabling remote code execution

  • CVE-2025-47984, rated important and tied to information disclosure

All three involve out-of-bounds memory access triggered through carefully structured metafiles.

One flaw centered on invalid rectangle objects that allowed attackers to influence memory writes during text rendering.

Another bypassed scan-line bounds checks during thumbnail generation.

The third concerned string handling within print-job initialization, exposing heap data when null-termination assumptions failed.

How Attacks Could Unfold

Crafted EMF+ files could manipulate color and alpha values, heap allocation behavior and pointer calculations. 

Check Point Research (CPR) demonstrated that attackers could write controlled values beyond buffer limits or read memory past intended boundaries, potentially accessing sensitive information or compromising systems without user interaction in certain scenarios.

“Our purpose in publishing this blog after security fixes were implemented is to further raise awareness of these vulnerabilities and provide Windows users with defensive insights and mitigation recommendations,” the researchers said.

Read more aboutWindows vulnerabilities: High Number of Windows 10 Users Remain as End-of-Life Looms

Microsoft Patches Shipped

Microsoft addressed the issues in GdiPlus.dll versions 10.0.26100.3037 through 10.0.26100.4946 and gdi32full.dll version 10.0.26100.4652.

Mitigations included new validation checks for rectangle data, scan-line boundary trimming and corrected pointer arithmetic in print-handling routines. Fixes arrived through KB5058411 in May, KB5062553 in July and KB5063878 in August.

The work underscores ongoing risks tied to complex graphics pipelines that accept untrusted content.

Researchers stressed proactive patching and defensive awareness, noting the bugs also impacted Microsoft Office for Mac and Android.

Image credit: JarTee / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCISA and NSA Outline Best Practices to Secure Exchange Servers
Next Article APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Beware of Winter Olympics scams and other cyberthreats

February 2, 2026

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Look out for phony verification pages spreading malware

September 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.