ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: Computer Terrorism (UK) :: Incident Response Centre - Microsoft Publisher Font Parsing Vulnerability



> -----Original Message-----
> From: irc@xxxxxxxxxxxxxxxxxxxxx [mailto:irc@xxxxxxxxxxxxxxxxxxxxx] 
> Sent: Tuesday, September 12, 2006 10:59 PM
> To: bugtraq@xxxxxxxxxxxxxxxxx
> Subject: Computer Terrorism (UK) :: Incident Response Centre 
> - Microsoft Publisher Font Parsing Vulnerability
> 
> Computer Terrorism  (UK) :: Incident Response Centre
> 
> www.computerterrorism.com
> 
> Security Advisory: CT12-09-2006-2.htm
> 
> 
> ==============================================
> Microsoft Publisher Font Parsing Vulnerability 
> ==============================================
> 
> Advisory Date: 12th, September 2006
> 
> Severity: Critical
> Impact: Remote System Access
> Solution Status: Vendor Patch
>       
> CVE Reference:  CVE-2006-0001  
> 
> 
> Affected Software  
> =================
> 
> Microsoft Publisher 2000 (Office 2000) 
> Microsoft Publisher 2002 (Office 2002) 
> Microsoft Publisher 2003 (Office 2003) 
> 
> 
> 
> 1. OVERVIEW
> ===========
> 
> Microsoft Publisher is a lightweight desktop publishing (DTP) 
> application bundled 
> with Microsoft Office Small Business and Professional. The 
> application facilitates 
> the design of professional business and marketing 
> communications via familiar Office 
> tools & functionality. 
> 
> Unfortunately, it transpires that Microsoft Publisher is 
> susceptible to a remote, 
> arbitrary code execution vulnerability that yields full 
> system access running 
> in the context of a target user.
> 
> 
> 
> 2. TECHNICAL NARRATIVE
> ======================
> 
> The vulnerability emanates from Publishers inability to 
> perform sufficient data 
> validation when processing the contents of a .pub document. 
> As a result, it is 
> possible to modify a .pub file in such a way that when opened 
> will corrupt critical 
> system memory, allowing an attacker to execute code of his choice.
> 
> More specifically, the vulnerable condition is derived from 
> an attacker controlled 
> string that facilitates an "extended" memory overwrite using 
> portions of the original 
> .pub file.
> 
> As no checks are made on the length of the data being copied, 
> the net result is 
> that of a classic "stack overflow" condition, in which EIP 
> control is gained via 
> one of several return addresses.
> 
> 
> 3. EXPLOITATION
> ===============
> 
> As with most file orientated vulnerabilities, the 
> aforementioned issue requires 
> a certain degree of social engineering to achieve successful 
> exploitation.
> 
> However, users of Microsoft Publisher 2000 (Office 2000) are 
> at an increased 
> risk due to the exploitability of the vulnerability in a 
> possible web-based attack 
> scenario.
> 
> 
> 
> 4. VENDOR RESPONSE
> ==================
> 
> The vendor security bulletin and corresponding patches are 
> available at the 
> following location:
> 
> http://www.microsoft.com/technet/security/Bulletin/MS06-054.mspx
> 
> 
> 5. DISCLOSURE ANALYSIS
> ======================
> 
> 03/08/2005  Preliminary Vendor notification.
> 12/08/2005  Vulnerability confirmed by Vendor.
> 03/01/2006  Public Disclosure Deferred by Vendor.
> 11/07/2006  Public Disclosure Deferred by Vendor.
> 12/09/2006  Coordinated public release.
> 
> Total Time to Fix: 1 year, 1 month, 6 days (402 days)
> 
> 
> 6. CREDIT
> =========
> 
> The vulnerability was discovered by Stuart Pearson of 
> Computer Terrorism (UK)
> 
> 
> ========================
> About Computer Terrorism
> ========================
> 
> Computer Terrorism (UK) Ltd is a global provider of Digital 
> Risk Intelligence services. 
> Our unique approach to vulnerability risk assessment and 
> mitigation has helped protect 
> some of the worlds most at risk organisations. 
> 
> Headquartered in London, Computer Terrorism has 
> representation throughout Europe & 
> North America and can be reached at +44 (0) 870 250 9866 or email:-
> 
> sales [at] computerterrorism.com
> 
> To learn more about our services and to register for a FREE 
> comprehensive website 
> penetration test, visit: http:/www.computerterrorism.com
> 
> 
> Computer Terrorism (UK) :: Protection for a vulnerable world.
> 



 




Copyright © Lexa Software, 1996-2009.