SB2006101002 - Multiple vulnerabilities in Microsoft Word
Published: October 10, 2006 Updated: December 5, 2016
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2006-3651)
The vulnerability allows a remote user to execute arbitrary code on the target system.The weakness is due to a boundary error. By persuading the victim to load and open a Word document containing a specially crafted mail merge file, a remote attacker can execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in compromise of vulnerable system.
2) Buffer overflow (CVE-ID: CVE-2006-4534)
The vulnerability allows a remote user to execute arbitrary code on the target system.The weakness is due to stack-based buffer overflow. By persuading the victim to load and open a specially crafted Word document containing a malformed string, a remote attacker can execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Note: this vulnerability was being actively exploited.
3) Buffer overflow (CVE-ID: CVE-2006-4693)
The vulnerability allows a remote user to execute arbitrary code on the target system.The weakness is due to buffer overflow. An attacker could exploit this vulnerability when Word for Mac parses a specially crafted file that contains a malformed string.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
4) Buffer overflow (CVE-ID: CVE-2006-3647)
The vulnerability allows a remote user to execute arbitrary code on the target system.The weakness is due to buffer overflow. By persuading the victim to load and open a specially crafted Word document containing a malformed string, a remote attacker can execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Remediation
Install update from vendor's website.