Vulnerability identifier: #VU1210
Vulnerability risk: Critical
CVSSv4.0: 8.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red]
CVE-ID: CVE-2006-5994
CWE-ID:
CWE-119
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Works Suite
Client/Desktop applications /
Other client software
Microsoft Office
Client/Desktop applications /
Office applications
Microsoft Office for Mac
Client/Desktop applications /
Office applications
Vendor:
Microsoft
Description
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability is caused by boundary error when handling Word files with a specially crafted string. A remote attacker can create a specially crafted Word file, trick the victim into opening it and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in compromise of vulnerable system.
Note: this vulnerability is being actively exploited.
Mitigation
Microsoft Office 2000 Service Pack 3
Microsoft Word 2000 - Download the update (KB929139)
Microsoft Office XP Service Pack 3
Microsoft Word 2002 - Download the update (KB929061)
Microsoft Office 2003 Service Pack 2
Microsoft Word 2003 - Download the update (KB929057)
Microsoft Works Suites
Microsoft Works Suite 2004 - Download the update (KB929061) (same as the Microsoft Word 2002 update)
Microsoft Works Suite 2005 - Download the update (KB929061) (same as the Microsoft Word 2002 update)
Microsoft Works Suite 2006 - Download the update (KB929061) (same as the Microsoft Word 2002 update)
Microsoft Office 2004 for Mac
Microsoft Office 2004 for Mac - Download the update (KB932185)Vulnerable software versions
: 2000, 2002, 2003
Works Suite: 2004 - 2006
Microsoft Office: XP, 2000 Service Pack 3, 2003
Microsoft Office for Mac: 2004
External links
https://technet.microsoft.com/library/security/929433
https://technet.microsoft.com/library/security/ms07-014
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.