===================================================================== CERT-Renater Note d'Information No. 2006/VULN514 _____________________________________________________________________ DATE : 11/10/2006 HARDWARE PLATFORM(S) : / OPERATING SYSTEM(S) : Systems running Microsoft Office. ====================================================================== http://www.microsoft.com/technet/security/Bulletin/MS06-062.mspx MS06-062 - Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (922581) Affected Software: - Microsoft Office 2000 Service Pack 3 - Microsoft Access 2000 - Microsoft Excel 2000 - Microsoft FrontPage 2000 - Microsoft Outlook 2000 - Microsoft PowerPoint 2000 - Microsoft Publisher 2000 - Microsoft Word 2000 - Microsoft Office XP Service Pack 3 - Microsoft Access 2002 - Microsoft Excel 2002 - Microsoft FrontPage 2002 - Microsoft Outlook 2002 - Microsoft PowerPoint 2002 - Microsoft Publisher 2002 - Microsoft Visio 2002 - Microsoft Word 2002 - Microsoft Office 2003 Service Pack 1 or Service Pack 2 - Microsoft Access 2003 - Microsoft Excel 2003 - Microsoft Excel 2003 Viewer - Microsoft FrontPage 2003 - Microsoft InfoPath 2003 - Microsoft OneNote 2003 - Microsoft Outlook 2003 - Microsoft PowerPoint 2003 - Microsoft Project 2003 - Microsoft Publisher 2003 - Microsoft Visio 2003 - Microsoft Word 2003 - Microsoft Word 2003 Viewer - Microsoft Project 2000 Service Release 1 - Microsoft Project 2002 Service Pack 1 - Microsoft Visio 2002 Service Pack 2 - Microsoft Office 2004 for Mac - Microsoft Office v. X for Mac Non-Affected Software: - Microsoft PowerPoint 2003 Viewer - Microsoft Works Suites: - Microsoft Works Suite 2004 - Microsoft Works Suite 2005 - Microsoft Works Suite 2006 - From Microsoft Security Bulletin MS06-062: Vulnerability details: Office Improper Memory Access Vulnerability - CVE-2006-3434: A remote code execution vulnerability exists in Office. An attacker could exploit this vulnerability when Office parses a file with a malformed string. If a user were logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights. Office Malformed Chart Record Vulnerability - CVE-2006-3650: A remote code execution vulnerability exists in Office. An attacker could exploit this vulnerability when Office parses a file with a malformed chart record. If a user were logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights. Office Malformed Record Memory Corruption Vulnerability - CVE-2006-3864: A remote code execution vulnerability exists in Office. An attacker could exploit this vulnerability when Office parses a file with a malformed record. If a user were logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights. Microsoft Office Smart Tag Parsing Vulnerability - CVE-2006-3868: A remote code execution vulnerability exists in Microsoft Office, and could be exploited when Office opens a specially crafted file and parses a malformed Smart Tag. Such a specially crafted file might be included as an e-mail attachment or hosted on a malicious web site. Viewing or previewing a malformed e-mail message in Outlook could not lead to exploitation of this vulnerability. An attacker could exploit the vulnerability by constructing a specially crafted Office file that could allow remote code execution. If a user were logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights. ====================================================================== ========================================================= Les serveurs de référence du CERT-Renater http://www.urec.fr/securite http://www.cru.fr/securite http://www.renater.fr ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 151 bd de l'Hopital | fax : 01-53-94-20-41 + + 75013 Paris | email: certsvp@renater.fr + =========================================================