Overview
A vulnerability in the way Microsoft Word handles malformed Word Document streams could allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Description
Microsoft Word contains a memory corruption vulnerability that could be triggered when Word opens a document containing a malformed Word Document stream. Although this vulnerability was initially reported to only cause a denial-of-service, it is now believed that it can be used to execute arbitrary code. Note that this vulnerability is actively being exploited. |
Impact
By convincing a user to open a specially crafted Word document, a remote, unauthenticated attacker could execute arbitrary code with the privileges of the user running Word. If the user is logged in with administrative privileges, the attacker could take complete control of a vulnerable system. |
Solution
Apply an update |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.microsoft.com/technet/security/bulletin/ms07-024.mspx
- http://www.microsoft.com/technet/security/advisory/933052.mspx
- http://www.avertlabs.com/research/blog/?p=206
- http://www.avertlabs.com/research/blog/?p=199
- http://isc.sans.org/diary.html?storyid=1940
- http://isc.sans.org/diary.html?n&storyid=2226
- http://secunia.com/advisories/24122/
- http://securitytracker.com/alerts/2007/Feb/1017653.html
- http://www.securityfocus.com/bid/22567
Acknowledgements
This vulnerability was reported by McAfee Avert Labs.
This document was written by Jeff Gennari.
Other Information
CVE IDs: | CVE-2007-0870 |
Severity Metric: | 8.78 |
Date Public: | 2007-02-09 |
Date First Published: | 2007-02-15 |
Date Last Updated: | 2007-06-15 21:54 UTC |
Document Revision: | 27 |