#VU1215 Buffer overflow in Microsoft Client/Desktop applications


Published: 2020-03-18

Vulnerability identifier: #VU1215

Vulnerability risk: Critical

CVSSv3.1: 8.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C]

CVE-ID: CVE-2006-6561

CWE-ID: CWE-119

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
Works Suite
Client/Desktop applications / Other client software
Microsoft Office
Client/Desktop applications / Office applications
Microsoft Office for Mac
Client/Desktop applications / Office applications
Word Viewer
Client/Desktop applications / Office applications

Vendor:
Microsoft

Description

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability is caused by boundary error when processing  an unchecked word count in Word files. A remote attacker can create a specially crafted Word file, trick the victim into opening it and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in compromise of vulnerable system.

Note: this vulnerability is being actively exploited.


Mitigation

Microsoft Office 2000 Service Pack 3

Microsoft Word 2000 - Download the update (KB929139)

Microsoft Office XP Service Pack 3

Microsoft Word 2002 - Download the update (KB929061)

Microsoft Office 2003 Service Pack 2

Microsoft Word 2003 - Download the update (KB929057)

Microsoft Word Viewer 2003 - Download the update (KB924883)

Microsoft Works Suites

Microsoft Works Suite 2004 - Download the update (KB929061) (same as the Microsoft Word 2002 update)

Microsoft Works Suite 2005 - Download the update (KB929061) (same as the Microsoft Word 2002 update)

Microsoft Works Suite 2006 - Download the update (KB929061) (same as the Microsoft Word 2002 update)

Microsoft Office 2004 for Mac

Microsoft Office 2004 for Mac - Download the update (KB932185)

Vulnerable software versions

:

Works Suite: 2004 - 2006

Microsoft Office:

Microsoft Office for Mac: 2004

Word Viewer: 2003


External links
http://technet.microsoft.com/library/security/ms07-014


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.


Latest bulletins with this vulnerability