#VU1179 Buffer overflow in Microsoft Client/Desktop applications


Published: 2016-11-15 | Updated: 2016-12-05

Vulnerability identifier: #VU1179

Vulnerability risk: Critical

CVSSv3.1: 8.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C]

CVE-ID: CVE-2006-3649

CWE-ID: CWE-119

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Microsoft Access
Client/Desktop applications / Office applications
Microsoft Project
Client/Desktop applications / Office applications
Microsoft Office
Client/Desktop applications / Office applications
Microsoft Visio
Client/Desktop applications / Office applications
Microsoft Visual Basic for Applications SDK
Universal components / Libraries / Software for developers
Works Suite
Client/Desktop applications / Other client software

Vendor: Microsoft

Description
The vulnerability allows a remote user to execute arbitrary code on the target system.

The weakness is due to buffer overflow. By persuading the victim to open a malicious Office document containing Visual Basic for Applications (VBA) script, a remote attacker can execute arbitrary code.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

Note: this vulnerability was being actively exploited.

Mitigation
Microsoft Office 2000 Service Pack 3 - https://www.microsoft.com/downloads/details.aspx?FamilyId=837A4FA9-FABC-4119-9AAF-2C8663029D2B
Microsoft Project 2000 Service Release 1 - https://www.microsoft.com/downloads/details.aspx?FamilyId=744DD25D-B9A7-4E30-B64E-1C9BB0F87D90
Microsoft Access 2000 Runtime Service Pack 3 - https://www.microsoft.com/downloads/details.aspx?FamilyId=ED5A8C40-C592-4299-AFB2-5F0F6E2B1DCD
Microsoft Office XP Service Pack 3 - https://www.microsoft.com/downloads/details.aspx?FamilyId=B26ADC3C-1DB8-46FD-8381-B199EE351E7C
Microsoft Project 2002 Service Pack 1 - https://www.microsoft.com/downloads/details.aspx?FamilyId=62EF50AA-6061-4185-9713-F8C31B195103
Microsoft Visio 2002 Service Pack 2 - https://www.microsoft.com/downloads/details.aspx?FamilyId=43525B6A-58B7-49C7-88D8-4983D1614A96
Microsoft Works Suite 2004 - https://www.microsoft.com/downloads/details.aspx?FamilyId=B26ADC3C-1DB8-46FD-8381-B199EE351E7C
Microsoft Works Suite 2005 - https://www.microsoft.com/downloads/details.aspx?FamilyId=B26ADC3C-1DB8-46FD-8381-B199EE351E7C
Microsoft Works Suite 2006 - https://www.microsoft.com/downloads/details.aspx?FamilyId=B26ADC3C-1DB8-46FD-8381-B199EE351E7C
Microsoft Visual Basic for Applications SDK 6.0 - https://www.microsoft.com/downloads/details.aspx?FamilyId=424DF92A-3CC4-4B72-B2F8-D45ED2A8F4B3
Microsoft Visual Basic for Applications SDK 6.2 - https://www.microsoft.com/downloads/details.aspx?FamilyId=424DF92A-3CC4-4B72-B2F8-D45ED2A8F4B3
Microsoft Visual Basic for Applications SDK 6.3 - https://www.microsoft.com/downloads/details.aspx?FamilyId=424DF92A-3CC4-4B72-B2F8-D45ED2A8F4B3
Microsoft Visual Basic for Applications SDK 6.4 - https://www.microsoft.com/downloads/details.aspx?FamilyId=424DF92A-3CC4-4B72-B2F8-D45ED2A8F4B3

Vulnerable software versions

Microsoft Access:

Microsoft Project:

Microsoft Office:

Microsoft Visual Basic for Applications SDK: 6.0 - 6.4

Microsoft Visio:

Works Suite: 2004 - 2006


External links
http://technet.microsoft.com/en-us/library/security/ms06-047.aspx


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.


Latest bulletins with this vulnerability