Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Microsoft Office Vendors:   Microsoft
Microsoft Office PNG and GIF File Buffer Error Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1016470
SecurityTracker URL:
CVE Reference:   CVE-2006-0007, CVE-2006-0033   (Links to External Site)
Date:  Jul 11 2006
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2000 SP3, XP SP3, 2003 SP2; and prior service packs; Microsoft Project 2000 and 2002; Microsoft Works 2004, 2005, and 2006
Description:   A vulnerability was reported in Microsoft Office in the Office Filters. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted PNG or GIF file that, when processed by the target user with Microsoft Office, will trigger a buffer overflow and execute arbitrary code on the target system. The code will run with the privileges of the target user.

The Office viewers and Office for Mac versions are not affected.

Microsoft credits Fortinet Inc. with reporting the PNG vulnerability and NSFocus Security Team with reporting the GIF vulnerability.

Impact:   A remote user can create an image file that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued the following fixes:

Microsoft Office 2003 Service Pack 1 or Service Pack 2:

Microsoft Office XP Service Pack 3:

Microsoft Office 2000 Service Pack 3:

Microsoft Project 2002:

Microsoft Project 2000:

Microsoft Works Suite 2004:

Microsoft Works Suite 2005:

Microsoft Works Suite 2006:

A restart may be required.

The Microsoft bulletin is available at:

Vendor URL: (Links to External Site)
Cause:   Boundary error
Underlying OS:  Windows (2000), Windows (2003), Windows (XP)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC