SB2006101002 - Multiple vulnerabilities in Microsoft Word



SB2006101002 - Multiple vulnerabilities in Microsoft Word

Published: October 10, 2006 Updated: December 5, 2016

Security Bulletin ID SB2006101002
Severity
Critical
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 25% High 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2006-3651)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The weakness is due to a boundary error. By persuading the victim to load and open a Word document containing a specially crafted mail merge file, a remote attacker can execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in compromise of vulnerable system.



2) Buffer overflow (CVE-ID: CVE-2006-4534)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The weakness is due to stack-based buffer overflow. By persuading the victim to load and open a specially crafted Word document containing a malformed string, a remote attacker can execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

Note: this vulnerability was being actively exploited.

3) Buffer overflow (CVE-ID: CVE-2006-4693)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The weakness is due to buffer overflow. An attacker could exploit this vulnerability when Word for Mac parses a specially crafted file that contains a malformed string.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system. 

4) Buffer overflow (CVE-ID: CVE-2006-3647)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The weakness is due to buffer overflow. By persuading the victim to load and open a specially crafted Word document containing a malformed string, a remote attacker can execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system. 

Remediation

Install update from vendor's website.