SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Microsoft PowerPoint Vendors:   Microsoft
Microsoft PowerPoint 'mso.dll' Buffer Overflow May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1016496
SecurityTracker URL:  http://securitytracker.com/id/1016496
CVE Reference:   CVE-2006-3590   (Links to External Site)
Updated:  Aug 8 2006
Original Entry Date:  Jul 14 2006
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 2000, 2002, 2003, 2004 for Mac, v. X for Mac
Description:   A vulnerability was reported in Microsoft PowerPoint. A remote user may be able to cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted file that, when loaded by the target user, will trigger a buffer overflow in 'mso.dll' and execute arbitrary code on the target system. The code will run with the privileges of the target user.

Microsoft PowerPoint 2003 Viewer and Microsoft Works Suites are not affected.

The original report is available at:

http://www.symantec.com/enterprise/security_response/writeup.jsp?docid=2006-071212-4413-99

A FAQ by Juha-Matti Laurio is available at:

http://blogs.securiteam.com/?p=508

Exploit code is available on the Internet.

Microsoft credits Elia Florio of Symantec and Dejun Meng of the Fortinet Security Research Team with reporting this vulnerability.

Impact:   A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued the following fixes:

Microsoft Office 2000 Service Pack 3:

http://www.microsoft.com/downloads/details.aspx?FamilyId=B7B5615B-7C20-4C49-892F-7F4CCC2D6006

Microsoft Office XP Service Pack 3:

http://www.microsoft.com/downloads/details.aspx?FamilyId=A9C7E43B-A0A6-4C81-87ED-3F4DED78EAEA

Microsoft Office 2003 Service Pack 1 or Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=DE1CB2A7-5D4C-44B8-BC40-7E0A88CC3081

Microsoft Office 2004 for Mac:

http://www.microsoft.com/mac

Microsoft Office v. X for Mac:

http://www.microsoft.com/mac

The Microsoft advisory is available at:

http://www.microsoft.com/technet/security/bulletin/ms06-048.mspx

The previous Microsoft advisory is available at:

http://www.microsoft.com/technet/security/advisory/922970.mspx

The Microsoft blog entry from July 15 (UTC/GMT) is available at:

http://blogs.technet.com/msrc/archive/2006/07/14/441893.aspx

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms06-048.mspx (Links to External Site)
Cause:   Not specified
Underlying OS:   UNIX (OS X), Windows (2000), Windows (2003), Windows (XP)

Message History:   None.


 Source Message Contents

Date:  Fri, 14 Jul 2006 00:20:52 -0400
Subject:  possible Microsoft PowerPoint vulnerability


http://www.symantec.com/enterprise/security_response/writeup.jsp?docid=2006-071212-4413-99

http://isc.sans.org/diary.php?storyid=1484
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC