SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Microsoft Word Vendors:   Microsoft
Microsoft Word Unchecked Count Vulnerability Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1017390
SecurityTracker URL:  http://securitytracker.com/id/1017390
CVE Reference:   CVE-2006-6561   (Links to External Site)
Updated:  Feb 13 2007
Original Entry Date:  Dec 16 2006
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 2000, 2002; 2003, 2004 for Mac
Description:   A vulnerability was reported in Microsoft Word. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted Word document that, when loaded by the target user, will trigger a buffer overflow and execute arbitrary code on the target system. The code will run with the privileges of the target user.

The vulnerability occurs when Word parses an unchecked count in the document.

'disco' released a demonstration exploit on December 12, 2006, available at:

http://www.milw0rm.com/exploits/2922

On December 15, 2006, Microsoft confirmed that the exploit demonstrates a new, previously unreported vulnerability.

This vulnerability is different than Alert ID 1017339, CVE-2006-5994. This vulnerability is also different than Alert ID 1017358, CVE-2006-6456.

Microsoft indicates that Word Viewer 2003 is also affected.

Impact:   A remote user can create a Word document that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   On February 13, 2007, the vendor issued the following fixes:

Microsoft Word 2000:

http://www.microsoft.com/downloads/details.aspx?FamilyId=F1E61E6A-BE3D-4536-AF76-A11D5CE67199

Microsoft Word 2002:

http://www.microsoft.com/downloads/details.aspx?FamilyId=A1CA8DD7-0622-4D66-A85F-A6586545EF9D

Microsoft Word 2003:

http://www.microsoft.com/downloads/details.aspx?FamilyID=882F8503-DA72-43C9-B556-A002EC58F289

Microsoft Word Viewer 2003:

http://www.microsoft.com/downloads/details.aspx?FamilyId=FB59798B-AFE2-4103-9991-CBDD7686F9AD

Microsoft Works Suite 2004:

http://www.microsoft.com/downloads/details.aspx?FamilyId=A1CA8DD7-0622-4D66-A85F-A6586545EF9D

Microsoft Works Suite 2005:

http://www.microsoft.com/downloads/details.aspx?FamilyId=A1CA8DD7-0622-4D66-A85F-A6586545EF9D

Microsoft Works Suite 2006:

http://www.microsoft.com/downloads/details.aspx?FamilyId=A1CA8DD7-0622-4D66-A85F-A6586545EF9D

Microsoft Office 2004 for Mac:

http://www.microsoft.com/mac/

The Microsoft advisory is available at:

http://www.microsoft.com/technet/security/bulletin/ms07-014.mspx

The original Microsoft blog entry is available at:

http://blogs.technet.com/msrc/archive/2006/12/15/update-on-current-word-vulnerability-reports.aspx

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms07-014.mspx (Links to External Site)
Cause:   Access control error
Underlying OS:  UNIX (macOS/OS X), Windows (2000), Windows (2003), Windows (XP)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC