SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Microsoft Office Vendors:   Microsoft
Microsoft Office Object Processing Flaw Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1019375
SecurityTracker URL:  http://securitytracker.com/id/1019375
CVE Reference:   CVE-2008-0103   (Links to External Site)
Date:  Feb 12 2008
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2000 SP3, 2003 SP2, XP SP3, and 2004 for Mac
Description:   A vulnerability was reported in Microsoft Office. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create an Office document containing a specially crafted object that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the target user.

Office 2003 SP3, Excel Viewer 2003, PowerPoint 2003 Viewer, Visio 2003 Viewer, Word Viewer 2003, 2007 Microsoft Office System, 2007 Microsoft Office System SP1, and Office 2008 for Mac are not affected.

Shaun Colley of NGSSoftware reported this vulnerability.

Impact:   A remote user can create an Office file that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued the following fixes:

Microsoft Office 2000 Service Pack 3:

http://www.microsoft.com/downloads/details.aspx?FamilyId=5FB74E24-D9EE-4951-9C46-E1C84617F097

Microsoft Office XP Service Pack 3:

http://www.microsoft.com/downloads/details.aspx?FamilyId=3E147B1A-F3BE-465F-8587-7F3A33D6A6E5

Microsoft Office 2003 Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=F4AC0F34-4604-4BBE-9669-01DB645041CA

Microsoft Office 2004 for Mac:

http://www.microsoft.com/downloads/details.aspx?FamilyId=36B00C58-192D-488C-A069-730C69F0B6B0

A restart is not required.

The Microsoft advisory is available at:

http://www.microsoft.com/technet/security/bulletin/ms08-013.mspx

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms08-013.mspx (Links to External Site)
Cause:   Access control error
Underlying OS:  UNIX (macOS/OS X), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC