Remote code execution in Microsoft VBA



Published: 2006-08-08 | Updated: 2016-12-05
Risk Critical
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2006-3649
CWE-ID CWE-119
Exploitation vector Network
Public exploit This vulnerability is being exploited in the wild.
Vulnerable software
Subscribe
Microsoft Access
Client/Desktop applications / Office applications

Microsoft Project
Client/Desktop applications / Office applications

Microsoft Office
Client/Desktop applications / Office applications

Microsoft Visio
Client/Desktop applications / Office applications

Microsoft Visual Basic for Applications SDK
Universal components / Libraries / Software for developers

Works Suite
Client/Desktop applications / Other client software

Vendor Microsoft

Security Bulletin

This security bulletin contains one critical risk vulnerability.

1) Buffer overflow

EUVDB-ID: #VU1179

Risk: Critical

CVSSv3.1: 8.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C]

CVE-ID: CVE-2006-3649

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary code on the target system.

The weakness is due to buffer overflow. By persuading the victim to open a malicious Office document containing Visual Basic for Applications (VBA) script, a remote attacker can execute arbitrary code.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

Note: this vulnerability was being actively exploited.

Mitigation

Microsoft Office 2000 Service Pack 3 - https://www.microsoft.com/downloads/details.aspx?FamilyId=837A4FA9-FABC-4119-9AAF-2C8663029D2B
Microsoft Project 2000 Service Release 1 - https://www.microsoft.com/downloads/details.aspx?FamilyId=744DD25D-B9A7-4E30-B64E-1C9BB0F87D90
Microsoft Access 2000 Runtime Service Pack 3 - https://www.microsoft.com/downloads/details.aspx?FamilyId=ED5A8C40-C592-4299-AFB2-5F0F6E2B1DCD
Microsoft Office XP Service Pack 3 - https://www.microsoft.com/downloads/details.aspx?FamilyId=B26ADC3C-1DB8-46FD-8381-B199EE351E7C
Microsoft Project 2002 Service Pack 1 - https://www.microsoft.com/downloads/details.aspx?FamilyId=62EF50AA-6061-4185-9713-F8C31B195103
Microsoft Visio 2002 Service Pack 2 - https://www.microsoft.com/downloads/details.aspx?FamilyId=43525B6A-58B7-49C7-88D8-4983D1614A96
Microsoft Works Suite 2004 - https://www.microsoft.com/downloads/details.aspx?FamilyId=B26ADC3C-1DB8-46FD-8381-B199EE351E7C
Microsoft Works Suite 2005 - https://www.microsoft.com/downloads/details.aspx?FamilyId=B26ADC3C-1DB8-46FD-8381-B199EE351E7C
Microsoft Works Suite 2006 - https://www.microsoft.com/downloads/details.aspx?FamilyId=B26ADC3C-1DB8-46FD-8381-B199EE351E7C
Microsoft Visual Basic for Applications SDK 6.0 - https://www.microsoft.com/downloads/details.aspx?FamilyId=424DF92A-3CC4-4B72-B2F8-D45ED2A8F4B3
Microsoft Visual Basic for Applications SDK 6.2 - https://www.microsoft.com/downloads/details.aspx?FamilyId=424DF92A-3CC4-4B72-B2F8-D45ED2A8F4B3
Microsoft Visual Basic for Applications SDK 6.3 - https://www.microsoft.com/downloads/details.aspx?FamilyId=424DF92A-3CC4-4B72-B2F8-D45ED2A8F4B3
Microsoft Visual Basic for Applications SDK 6.4 - https://www.microsoft.com/downloads/details.aspx?FamilyId=424DF92A-3CC4-4B72-B2F8-D45ED2A8F4B3

Vulnerable software versions

Microsoft Access: 2000

Microsoft Project: 2000 Service Release 1 - 2002 Service Pack 1

Microsoft Office: 2000 Service Pack 3 - XP

Microsoft Visual Basic for Applications SDK: 6.0 - 6.4

Microsoft Visio: 2002 Service Pack 2

Works Suite: 2004 - 2006

External links

http://technet.microsoft.com/en-us/library/security/ms06-047.aspx


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.



###SIDEBAR###