SB2010110901 - Multiple vulnerabilities in Microsoft Office
Published: November 9, 2010 Updated: March 22, 2017
Security Bulletin ID
SB2010110901
Severity
High
Patch available
YES
Number of vulnerabilities
6
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Integer underflow (CVE-ID: CVE-2010-2573)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to integer underflow when handling malicious PowerPoint files. A remote attacker can create a specially crafted PowerPoint file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in arbitrary code execution on the vulnerable system.
2) Stack-based buffer overflow (CVE-ID: CVE-2010-3333)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to stack-based buffer overflow when handling malicious RTF formatted data. A remote attacker can create a specially crafted .rtf file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in arbitrary code execution on the vulnerable system.
3) Memory corruption (CVE-ID: CVE-2010-3334)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to boundary error when parsing office drawing records. A remote attacker can create a specially crafted Office Art Drawing record with crafted msofbtSp records and unspecified flags, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in arbitrary code execution on the vulnerable system.
4) Memory corruption (CVE-ID: CVE-2010-3335)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to boundary error related to drawing handling. A remote attacker can create a specially crafted Office file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in arbitrary code execution on the vulnerable system.
5) Memory corruption (CVE-ID: CVE-2010-3336)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to boundary error related to an MSO large SPID read AV. A remote attacker can create a specially crafted Office file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in arbitrary code execution on the vulnerable system.
6) Memory corruption (CVE-ID: CVE-2010-3337)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to boundary error when loading DLL files. A remote attacker can create a specially crafted Office file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in arbitrary code execution on the vulnerable system.
Remediation
Install update from vendor's website.