Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Microsoft Word Font Parsing Buffer Overflow Vulnerability
Secunia ^

Posted on 07/12/2005 1:34:25 PM PDT by frogjerk

Secunia Advisory: SA15998 Print Advisory Release Date: 2005-07-12

Critical: Highly critical Impact: System access Where: From remote Solution Status: Vendor Patch

Software: Microsoft Office 2000 Microsoft Office XP Microsoft Word 2000 Microsoft Word 2002 Microsoft Works Suite 2001 Microsoft Works Suite 2002 Microsoft Works Suite 2003 Microsoft Works Suite 2004

Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.

CVE reference: CAN-2005-0564

Description: Lord Yup has reported a vulnerability in Microsoft Word, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error within the parsing of fonts. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a specially crafted Word document.

Successful exploitation allows execution of arbitrary code.

Solution: Apply patches.

Microsoft Office 2000 SP3: http://www.microsoft.com/downloa...864B-B196-48F4-A4B9-2ED7FB6D17D2

Microsoft Office XP SP3: http://www.microsoft.com/downloa...D2C5-1E2A-4FFB-8FC2-B2B217015820

Microsoft Works Suite 2000: http://www.microsoft.com/downloa...864B-B196-48F4-A4B9-2ED7FB6D17D2

Microsoft Works Suite 2001: http://www.microsoft.com/downloa...864B-B196-48F4-A4B9-2ED7FB6D17D2

Microsoft Works Suite 2002: http://www.microsoft.com/downloa...D2C5-1E2A-4FFB-8FC2-B2B217015820

Microsoft Works Suite 2003: http://www.microsoft.com/downloa...D2C5-1E2A-4FFB-8FC2-B2B217015820

Microsoft Works Suite 2004: http://www.microsoft.com/downloa...D2C5-1E2A-4FFB-8FC2-B2B217015820

Provided and/or discovered by: Lord Yup

Original Advisory: MS05-035 (903672): http://www.microsoft.com/technet/security/Bulletin/MS05-035.mspx

iDEFENSE: http://www.idefense.com/applicat...?id=281&type=vulnerabilities


TOPICS: News/Current Events; Technical
KEYWORDS:
Patch away!
1 posted on 07/12/2005 1:34:28 PM PDT by frogjerk
[ Post Reply | Private Reply | View Replies]

To: frogjerk
Here's an extremely critical one...
Secunia Advisory:	SA16004	Print Advisory  
Release Date:	2005-07-12

Critical:	
Extremely critical
Impact:	System access
Where:	From remote
Solution Status:	Vendor Patch

OS:	Microsoft Windows 2000 Advanced Server
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Server
Microsoft Windows 98
Microsoft Windows 98 Second Edition
Microsoft Windows Millenium
Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Web Edition
Microsoft Windows XP Home Edition
Microsoft Windows XP Professional

	Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.

CVE reference:	CAN-2005-1219

Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to a boundary error within the color management module when validating ICC profile format tags. This can be exploited to cause a buffer overflow by e.g. tricking a user into visiting a malicious web site or view a malicious e-mail message containing a specially crafted image file.

Successful exploitation allows execution of arbitrary code.

NOTE: According to Microsoft, the vulnerability is already being exploited.

Solution:
Apply patches.

Microsoft Windows 2000 (requires SP4):
http://www.microsoft.com/downloa...18EC-EBF4-4C49-AFA0-F6A215B3624F

Microsoft Windows XP (requires SP1 or SP2):
http://www.microsoft.com/downloa...F2DB-ADCE-42BD-ABEE-1380F258158B

Microsoft Windows XP Professional (x64 Edition):
http://www.microsoft.com/downloa...B4BA-FB9B-4615-9BBE-EF6D3885467D

Microsoft Windows Server 2003:
http://www.microsoft.com/downloa...5ECB-2E79-4CE8-8269-E81219CE8F6C

Microsoft Windows Server 2003 (for Itanium-based systems):
http://www.microsoft.com/downloa...03BC-90E1-4FDE-9487-1816C4A647BB

Microsoft Windows Server 2003 (x64 Edition):
http://www.microsoft.com/downloa...7B42-8790-4965-9F26-DC5EDC2E84F8

Microsoft Windows 98, Windows 98 SE, and Windows ME:
The vendor will not be releasing fixes for these versions.

Provided and/or discovered by:
The vendor credits Shih-hao Weng.

Original Advisory:
MS05-036 (901214):
http://www.microsoft.com/technet/security/Bulletin/MS05-036.mspx

2 posted on 07/12/2005 1:38:28 PM PDT by frogjerk
[ Post Reply | Private Reply | To 1 | View Replies]

I dunno, but it seems to me that when your word processor can constitute a security vulnerability, a wrong turn was made somewhere..


3 posted on 07/12/2005 3:53:09 PM PDT by D-fendr
[ Post Reply | Private Reply | To 2 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson