|
|
| |
Credit:
The information has been provided by L.W.Z.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-10-150/
|
| |
Vulnerable Systems:
* Microsoft Office Word
User interaction is required to exploit this vulnerability in that the target must open a malicious document. The specific flaw exists in the parsing of sprmCMajority records in a Word document. Due to the lack of parameter checking when processing sprmCMajority sprm groups it is possible to arbitrarily control the amount of data being written to a stack based buffer resulting in a stack overflow vulnerability which can overwrite critical exception structures. Successful exploitation can lead to remote code execution under the credentials of the currently logged in user.
Patch Availability:
Microsoft has issued an update to correct this vulnerability. More details can be found at:
http://www.microsoft.com/technet/security/bulletin/ms10-056.mspx
CVE Information:
CVE-2010-1900
Disclosure Timeline:
2009-07-14 - Vulnerability reported to vendor
2010-08-11 - Coordinated public release of advisory
|
|
|