US-CERT Technical Cyber Security Alert TA06-139A -- Microsoft Word Vulnerability

20/05/06, US-CERT Technical Cyber Security Alert TA06-139A -- Microsoft Word Vulnerability
From: CERT Advisory <cert-advisory@cert.org>

Generated by MHonArc

CSIM Logo WelcomeCourses
Faculty, Student, Staff
Projects and reports
Conferences, workshop and seminars
Laboratories and reasearch facilities
Information related to CSIM
Information non-related to CSIM
Address, map, phone, etc.
Search

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]


To: cert-advisory@cert.org
Subject: US-CERT Technical Cyber Security Alert TA06-139A -- Microsoft Word Vulnerability
From: CERT Advisory <cert-advisory@cert.org>
Date: Fri, 19 May 2006 22:00:52 -0400
List-archive: <http://www.cert.org/>
List-help: <http://www.cert.org/>, <mailto:Majordomo@cert.org?body=help>
List-owner: <mailto:cert-advisory-owner@cert.org>
List-post: NO (posting not allowed on this list)
List-unsubscribe: <mailto:Majordomo@cert.org?body=unsubscribe%20cert-advisory>
Organization: CERT(R) Coordination Center - +1 412-268-7090

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


                     National Cyber Alert System

               Technical Cyber Security Alert TA06-139A


Microsoft Word Vulnerability

   Original release date: May 19, 2006
   Last revised: --
   Source: US-CERT


Systems Affected

     * Microsoft Word 2003
     * Microsoft Word XP (2002)

   Microsoft Word is included in Microsoft Works Suite and Microsoft
   Office. Other versions of Word, and other Office programs may be
   affected or act as attack vectors.


Overview

   A buffer overflow vulnerability in Microsoft Word could allow an
   attacker to execute arbitrary code on a vulnerable system.


I. Description

   Microsoft Word contains a buffer overflow vulnerability. Opening a
   specially crafted Word document, including documents hosted on web
   sites or attached to email messages, could trigger the
   vulnerability.

   Office documents can contain embedded objects. For example, a
   malicious Word document could be embedded in an Excel or PowerPoint
   document. Office documents other than Word documents could be used
   as attack vectors.

   For more information, please see Vulnerability Note VU#446012.


II. Impact

   By convincing a user to open a specially crafted Word document, an
   attacker could execute arbitrary code on a vulnerable system. If
   the user has administrative privileges, the attacker could gain
   complete control of the system.


III. Solution

   At the time of writing, there is no complete solution available.
   Consider the following workarounds:

   Do not open untrusted Word documents

    Do not open unfamiliar or unexpected Word or other Office
    documents, including those received as email attachments or hosted
    on a web site.  Please see Cyber Security Tip ST04-010 for more
    information.

   Do not rely on file extension filtering

    In most cases, Windows will call Word to open a document even if
    the document has an unknown file extension. For example, if
    document.d0c (note the digit "0") contains the correct file header
    information, Windows will open document.d0c with Word.


Appendix A. References

     * Vulnerability Note VU#446012 -
       <http://www.kb.cert.org/vuls/id/446012>

     * Cyber Security Tip ST04-010 -
       <http://www.us-cert.gov/cas/tips/ST04-010.html>


 ____________________________________________________________________

   Information used in this document came from SANS and Microsoft.
 ____________________________________________________________________

   The most recent version of this document can be found at:

     <http://www.us-cert.gov/cas/techalerts/TA06-139A.html>
 ____________________________________________________________________

   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <cert@cert.org> with "TA06-139A Feedback VU#446012" in the
   subject.
 ____________________________________________________________________

   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
 ____________________________________________________________________

   Produced 2006 by US-CERT, a government organization.

   Terms of use:

     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________


Revision History

   May 19, 2006: Initial release

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRG52p30pj593lg50AQKmsgf/SsFJRdioulQM941Cq2WA1tv+Y+3XcDme
kW13FyXDSiSVjkLeGTS3CvmELieeyS8WNgF/bF5b4nU7U8PmYYlm5SB4gygsgg9q
F7zNlw8EJoVxZTHDnFr8vq3IovhGsTsBwA0TyySUZHQkS6X5ESf65AzongmgRRT4
Oi4AUQd3n/XZdwrWtO7LPkaPF6IVTF28whLRwaeX+N7m10opL2WuqGrlbJ24VOJm
x6UbIRRIhLNdubLGUi3iDA1+Ds1LsnZR22COvvNoQ2F3mA2ahP4D4rBrLTyqnLye
zBCrGIIB0Wkvvh8yVelLKIplTWY/elUjwTUPsdQWsDeAm0AXKJjwPw==
=1Nea
-----END PGP SIGNATURE-----

Previous message sorted by date: US-CERT Technical Cyber Security Alert TA06-132A -- Apple Mac Products Affected by Multiple Vulnerabilities
Next message sorted by date: US-CERT Technical Cyber Security Alert TA06-153A -- Mozilla Products Contain Multiple Vulnerabilities
Previous message sorted by thread: US-CERT Technical Cyber Security Alert TA06-132A -- Apple Mac Products Affected by Multiple Vulnerabilities
Next message by thread: US-CERT Technical Cyber Security Alert TA06-153A -- Mozilla Products Contain Multiple Vulnerabilities
Main Index
Thread Index

CSIM home pageWMailAccount managementCSIM LibraryNetwork test toolsSearch CSIM directories
Contact us: Olivier Nicole CSIM    SET    AIT Last update: Jun 2006