=====================================================================
                                    CERT-Renater

                         Note d'Information No. 2006/VULN399
_____________________________________________________________________

DATE                      : 12/07/2006

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Microsoft Office & Works

======================================================================


MS06-038 Vulnerabilities in Microsoft Office Could Allow Remote Code Execution
CVE-2006-1316 CVE-2006-1540 CVE-2006-2389

Affected Software:
    - Microsoft Office 2003 Service Pack 1 or Service Pack 2
       - Microsoft Access 2003
       - Microsoft Excel 2003
       - Microsoft Excel 2003 Viewer
       - Microsoft FrontPage 2003
       - Microsoft InfoPath 2003
       - Microsoft OneNote 2003
       - Microsoft Outlook 2003
       - Microsoft PowerPoint 2003
       - Microsoft Project 2003
       - Microsoft Publisher 2003
       - Microsoft Visio 2003
       - Microsoft Word 2003
       - Microsoft Word 2003 Viewer
    - Microsoft Office XP Service Pack 3
       - Microsoft Access 2002
       - Microsoft Excel 2002
       - Microsoft FrontPage 2002
       - Microsoft Outlook 2002
       - Microsoft PowerPoint 2002
       - Microsoft Publisher 2002
       - Microsoft Visio 2002
       - Microsoft Word 2002
    - Microsoft Office 2000 Service Pack 3
       - Microsoft Access 2000
       - Microsoft Excel 2000
       - Microsoft FrontPage 2000
       - Microsoft Outlook 2000
       - Microsoft PowerPoint 2000
       - Microsoft Publisher 2000
       - Microsoft Word 2000
    - Microsoft Project 2002 Service Pack 1
    - Microsoft Visio 2002 Service Pack 2
    - Microsoft Project 2000 Service Release 1
    - Microsoft Office 2004 for Mac
    - Microsoft Office v. X for Mac

Non-Affected Software:
    - Microsoft Works Suites:
       - Microsoft Works Suite 2004
       - Microsoft Works Suite 2005
       - Microsoft Works Suite 2006

A remote code execution vulnerability exists in Office, and could be exploited
when a malformed string or property included in an Office file was parsed by
any of the affected Office applications. Such a string or property might be
included in an email attachment processed by one of the affected applications
or hosted on a malicious web site. Viewing or previewing a malformed email
message in an affected version of Outlook could not lead to exploitation of
this vulnerability. An attacker could exploit the vulnerability by
constructing a specially crafted Office file that could allow remote code
execution.

If a user were logged on with administrative user rights, an attacker who
successfully exploited this vulnerability could take complete control of an
affected system. An attacker could then install programs; view, change, or
delete data; or create new accounts with full user rights. Users whose
accounts are configured to have fewer user rights on the system could be
less affected than users who operate with administrative user rights.

Mitigating Factors
- ------------------
    - An attacker who successfully exploited this vulnerability could gain the
      same user rights as the local user. Users whose accounts are configured
      to have fewer user rights on the system could be less impacted than
      users who operate with administrative user rights.
	
    - On Outlook 2002 and Outlook 2003, the vulnerability could not be
      exploited automatically through e-mail. For an attack to be successful a
      user must accept a prompt confirming that they Open, Save or Cancel the
      attachment that is sent in an e-mail message before the exploit could
      occur.
	
    - In a Web-based attack scenario, an attacker could host a Web site that
      contains a Web page that is used to exploit this vulnerability. In
      addition, compromised Web sites and Web sites that accept or host
      user-provided content or advertisements could contain specially crafted
      content that could exploit this vulnerability. In all cases, however,
      an attacker would have no way to force users to visit these Web sites.
      Instead, an attacker would have to persuade users to visit the Web site,
      typically by getting them to click a link in an e-mail message or
      instant messenger message that takes users to the attacker's Web site.

    Note: Office 2000 does not prompt the user to Open, Save, or Cancel before
          opening a document.

Workarounds
- -----------
Microsoft has tested the following workarounds. While these workarounds will
not correct the underlying vulnerability, they help block known attack vectors.

Do not open or save Microsoft Office files that you receive from un-trusted
sources or that you received unexpectedly from trusted sources.

This vulnerability could be exploited when a user opens a file.

           =========================================================
           Les serveurs de référence du CERT-Renater
           http://www.urec.fr/securite
           http://www.cru.fr/securite
           http://www.renater.fr
           =========================================================
           + CERT-RENATER          | tel : 01-53-94-20-44          +
           + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
           + 75013 Paris           | email: certsvp@renater.fr     +
           =========================================================

