PDA

View Full Version : Pericolo! Microsoft Word buffer overflow


bort_83
08-10-2004, 11:09
TITLE:
Microsoft Word Document Parsing Buffer Overflow Vulnerability

SECUNIA ADVISORY ID:
SA12758

VERIFY ADVISORY:
http://secunia.com/advisories/12758/

CRITICAL:
Highly critical

IMPACT:
DoS, System access

WHERE:
>From remote

SOFTWARE:
Microsoft Office 2000
http://secunia.com/product/24/
Microsoft Office XP
http://secunia.com/product/23/
Microsoft Word 2000
http://secunia.com/product/2149/
Microsoft Word 2002
http://secunia.com/product/2150/

DESCRIPTION:
HexView has discovered a vulnerability in Microsoft Word, which can
be exploited by malicious people to cause a DoS (Denial of Service)
and potentially compromise a user's system.

The vulnerability is caused due to an input validation error within
the parsing of document files and may lead to a stack-based buffer
overflow.

This can be exploited to crash the process when the user opens a
specially crafted document. However, due to the nature of the
problem, execution of arbitrary code may potentially also be
possible, though it has not been proven.

The vulnerability has been confirmed in Microsoft Word 2000, but has
also been reported in Microsoft Word 2002.

SOLUTION:
Open trusted documents only.

For Internet Explorer users, documents on web sites can be opened
automatically in the browser, unless the security level for the
"Internet" security zone is set to "High" or the "File download"
setting has been disabled.

PROVIDED AND/OR DISCOVERED BY:
HexView

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.



-----