SB2006101001 - Multiple vulnerabilities in Microsoft PowerPoint



SB2006101001 - Multiple vulnerabilities in Microsoft PowerPoint

Published: October 10, 2006

Security Bulletin ID SB2006101001
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Memory corruption (CVE-ID: CVE-2006-3877)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability is caused by a boundary error when parsing malformed data records within the PowerPoint file. A remote attacker can create a specially crafted .ppt file, trick the victim into opening it and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in compromise of vulnerable system.

Note: this vulnerability was incorrectly patched in MS06-058. In February Microsoft released another bulletin MS07-015 to address this vulnerability again.

2) Buffer overflow (CVE-ID: CVE-2006-3876)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability is caused by a boundary error when parsing malformed data records within the PowerPoint presentation. A remote attacker can create a specially crafted .ppt file, trick the victim into opening it and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in compromise of vulnerable system.



3) NULL pointer dereference (CVE-ID: CVE-2006-3435)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability is caused by NULL pointer dereference error when parsing of a malformed slide notes field within the PowerPoint presentation. A remote attacker can create a specially crafted .ppt file, trick the victim into opening it and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in compromise of vulnerable system.


Remediation

Install update from vendor's website.