|
|
|
|
| |
Credit:
The information has been provided by Microsoft Security.
The original article can be found at:
http://www.microsoft.com/technet/security/bulletin/ms06-028.mspx
|
| |
Vulnerable Systems:
* Microsoft Office 2000 Service Pack 3
* Microsoft PowerPoint 2000 - Download the update (KB916520)
* Microsoft Office XP Service Pack 3
* Microsoft PowerPoint 2002 - Download the update (KB916519)
* Microsoft Office 2003 Service Pack 1 or Service Pack 2
* Microsoft PowerPoint 2003 - Download the update (KB916518)
* Microsoft Office 2004 for Mac
* Microsoft PowerPoint 2004 for Mac - Download the update (KB918963)
* Microsoft Office v. X for Mac
* Microsoft PowerPoint v. X for Mac - Download the update (KB918963)
Mitigating Factors for Microsoft PowerPoint Remote Code Execution Using a Malformed Record Vulnerability:
* An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
* This vulnerability could not be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message.
* When running Office XP and Office 2003, this vulnerability could not be exploited automatically through a Web-based attack scenario. An attacker would have to host a Web site that contains an Office file that is used to attempt to exploit this vulnerability. An attacker would have no way to force users to visit a malicious Web site. Instead, an attacker would have to persuade them to visit the Web site, typically by getting them to click a link that takes them to the attacker's site.
Note While this vulnerability could not be exploited automatically when visiting a Web site using Word 2000, Office 2000 does not prompt the user to Open, Save, or Cancel before opening a document.
Workarounds for Microsoft PowerPoint Remote Code Execution Using a Malformed Record Vulnerability:
Microsoft has tested the following workarounds. While these workarounds will not correct the underlying vulnerability, they help block known attack vectors. When a workaround reduces functionality, it is identified in the following section.
Do not open or save Microsoft PowerPoint files that you receive from un-trusted sources.
This vulnerability could be exploited when a user opens a file.
FAQ for Microsoft PowerPoint Remote Code Execution Using a Malformed Record Vulnerability:
What is the scope of the vulnerability?
This is a remote code execution vulnerability. An attacker who successfully exploited this vulnerability could remotely take complete control of an affected system.
If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights.
What causes the vulnerability?
When PowerPoint opens a specially crafted PowerPoint file using a malformed record, it may corrupt system memory in such a way that an attacker could execute arbitrary code.
What might an attacker use the vulnerability to do?
An attacker who successfully exploited this vulnerability could take complete control of the affected system.
How could an attacker exploit the vulnerability?
In a Web-based attack scenario, an attacker would have to host a Web site that contains an Office file that is used to attempt to exploit this vulnerability. An attacker would have no way to force users to visit a malicious Web site. Instead, an attacker would have to persuade them to visit the Web site, typically by getting them to click a link that takes them to the attacker's site.
In an e-mail attack scenario, an attacker could exploit the vulnerability by sending a specially crafted file to the user and by persuading the user to open the file.
Could I automatically be exploited when visiting a Web site using PowerPoint 2000?
While this vulnerability could not be exploited automatically when visiting a Web site using PowerPoint 2000, Office 2000 does not prompt the user to Open, Save, or Cancel before opening a document.
What systems are primarily at risk from the vulnerability?
Workstations and terminal servers are primarily at risk. Servers could be at more risk if users who do not have sufficient administrative permissions are given the ability to log on to servers and to run programs. However, best practices strongly discourage allowing this.
What does the update do?
The update removes the vulnerability by modifying the way that PowerPoint validates the length of a message before it passes the message to the allocated buffer.
When this security bulletin was issued, had this vulnerability been publicly disclosed?
No. Microsoft received information about this vulnerability through responsible disclosure. Microsoft had not received any information to indicate that this vulnerability had been publicly disclosed when this security bulletin was originally issued.
When this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited?
No. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers and had not seen any examples of proof of concept code published when this security bulletin was originally issued.
CVE Information:
CVE-2006-0022
|
|
|
|
|