Thread-topic: [SA21012] Microsoft Office String and Property Parsing Vulnerabilities
>
> TITLE:
> Microsoft Office String and Property Parsing Vulnerabilities
>
> SECUNIA ADVISORY ID:
> SA21012
>
> VERIFY ADVISORY:
>
>
> CRITICAL:
> Highly critical
>
> IMPACT:
> System access
>
> WHERE:
> From remote
>
> SOFTWARE:
> Microsoft Word 2003 Viewer
>
> Microsoft Word 2003
>
> Microsoft Word 2002
>
> Microsoft Word 2000
>
> Microsoft Visio 2003
>
> Microsoft Visio 2002
>
> Microsoft Publisher 2003
>
> Microsoft Access 2000
>
> Microsoft Access 2002
>
> Microsoft Access 2003
>
> Microsoft Excel 2000
>
> Microsoft Excel 2002
>
> Microsoft Excel 2003
>
> Microsoft Excel Viewer 2003
>
> Microsoft Frontpage 2000
>
> Microsoft Frontpage 2002
>
> Microsoft Frontpage 2003
>
> Microsoft InfoPath 2003
>
> Microsoft Office 2000
>
> Microsoft Office 2003 Professional Edition
>
> Microsoft Office 2003 Small Business Edition
>
> Microsoft Office 2003 Standard Edition
>
> Microsoft Office 2003 Student and Teacher Edition
>
> Microsoft Office 2004 for Mac
>
> Microsoft Office X for Mac
>
> Microsoft Office XP
>
> Microsoft OneNote 2003
>
> Microsoft Outlook 2000
>
> Microsoft Outlook 2002
>
> Microsoft Outlook 2003
>
> Microsoft PowerPoint 2000
>
> Microsoft PowerPoint 2002
>
> Microsoft PowerPoint 2003
>
> Microsoft Project 2000
>
> Microsoft Project 2002
>
> Microsoft Project 2003
>
> Microsoft Publisher 2000
>
> Microsoft Publisher 2002
>
>
> DESCRIPTION:
> Some vulnerabilities have been reported in Microsoft Office, which
> can be exploited by malicious people to compromise a user's system.
>
> 1) An error within the string parsing can be exploited to cause a
> buffer overflow when a malicious Office document containing a
> malformed string is opened.
>
> 2) Another error within the string parsing can also be exploited to
> corrupt memory when a malicious Office document containing a
> malformed string is opened.
>
> 3) An error within the property handling can be exploited to cause a
> buffer overflow when a malicious Office document containing a
> malformed property is opened.
>
> Successful exploitation of the vulnerabilities allows execution of
> arbitrary code.
>
> SOLUTION:
> Apply patches.
>
> Microsoft Office 2003 SP1 / SP2:
>
C6B-4A78-4A7B-995F-94738CAFE27F
>
> Microsoft Office XP SP3:
>
87E-A773-4D9C-9736-EEAFB34FF893
>
> Microsoft Office 2000 SP3:
>
379-0B9D-45D5-8B3C-CF9A4BD25DAE
>
> Microsoft Project 2002 SP2:
>
FA6-5E91-4AA8-82C1-4C9A92A5B954
>
> Microsoft Visio 2002 SP2:
>
75A-B69D-4064-942C-F5515C920E6B
>
> Microsoft Project 2000 SR1:
>
38A-F323-4006-BEED-A00840CAFBCE
>
> PROVIDED AND/OR DISCOVERED BY:
> 1) Reported by the vendor.
> 2) posidron (the vendor also credits Elia Florio, Symantec).
> 3) Reported by the vendor.
>
> ORIGINAL ADVISORY:
> MS06-038 (KB917284):
>
>