===================================================================== CERT-Renater Note d'Information No. 2013/VULN499 _____________________________________________________________________ DATE : 13/11/2013 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running Microsoft Office version 2003, 2007, 2010, 2013, 2013 RT. ====================================================================== KB2885093 https://technet.microsoft.com/en-us/security/bulletin/ms13-091 ______________________________________________________________________ Microsoft Security Bulletin MS13-091 - Important Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2885093) Published: Tuesday, November 12, 2013 Version: 1.0 General Information Executive Summary This security update resolves three privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a specially crafted WordPerfect document file is opened in an affected version of Microsoft Office software. An attacker who successfully exploited the most severe vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This security update is rated Important for supported editions of Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2013 RT software. Affected Software Microsoft Office 2003 Service Pack 3 (file format converters) Microsoft Office 2007 Service Pack 3 (file format converters) Microsoft Office 2010 Service Pack 1 (32-bit editions) (file format converters) Microsoft Office 2010 Service Pack 1 (32-bit editions) (proofing tools) Microsoft Office 2010 Service Pack 2 (32-bit editions) (file format converters) Microsoft Office 2010 Service Pack 2 (32-bit editions) (proofing tools) Microsoft Office 2010 Service Pack 1 (64-bit editions) (file format converters) Microsoft Office 2010 Service Pack 1 (64-bit editions) (proofing tools) Microsoft Office 2010 Service Pack 2 (64-bit editions) (file format converters) Microsoft Office 2010 Service Pack 2 (64-bit editions) (proofing tools) Microsoft Office 2013 (32-bit editions) (file format converters) Microsoft Office 2013 (64-bit editions) (file format converters) Microsoft Office 2013 RT (file format converters) Vulnerability Information WPD File Format Memory Corruption Vulnerability - CVE-2013-0082 A remote code execution vulnerability exists in the way that affected Microsoft Office software parses specially crafted WordPerfect document (.wpd) files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2013-0082. Word Stack Buffer Overwrite Vulnerability - CVE-2013-1324 A remote code execution vulnerability exists in the way that affected Microsoft Office software parses specially crafted WordPerfect document files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. To view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2013-1324. Word Heap Overwrite Vulnerability - CVE-2013-1325 A remote code execution vulnerability exists in the way that affected Microsoft Office software parses specially crafted WordPerfect document files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. To view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2013-1325. ========================================================= Serveur de référence du CERT-Renater https://services.renater.fr/ssi/ ========================================================== + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: cert@support.renater.fr + ==========================================================