CERT-In Vulnerability Note
CIVN-2008-0185
Microsoft Office Word Remote Code Execution
Original Issue Date:December 11, 2008
Severity Rating: HIGH
Systems Affected
- Microsoft Word 2007 SP1 and prior
- Microsoft Word 2003 SP3 and prior
- Microsoft Word 2002 SP3 and prior
- Microsoft Word 2000 SP3 and prior
- Microsoft Outlook 2007 SP1 and prior
- Microsoft Word Viewer 2003 SP3 and prior
- Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and prior
- Microsoft Office 2008 for Mac
- Microsoft Office 2004 for Mac
- Open XML File Format Converter for Mac versions 1.0.0 and 1.0.1
- Microsoft Works 8.X
Overview
Multiple remote code execution vulnerabilities are reported in Microsoft Word when handling malicious Office and Rich Text Format RTF files. An attacker can exploit these issues by tricking an unsuspecting victim into opening a malicious file. A successful exploit will result in the execution of arbitrary code in the context of the currently logged-in user.
Description
1. Microsoft Word Malformed Record Remote Code Execution Vulnerability
(
CVE-2008-4024
)
An unspecified error when parsing certain records can be exploited to corrupt memory via a specially crafted Word file.
2. Microsoft Word RTF Malformed Control Word Remote Code Execution Vulnerability
(
CVE-2008-4025
)
An integer overflow error exists when calculating the space required for the specified number of points in a polyline or polygon. This can be exploited to cause a heap-based buffer overflow during parsing of objects in Rich Text Format .rtf files
3. Microsoft Word Malformed Value Remote Code Execution Vulnerability
(
CVE-2008-4026
)
The vulnerability exists due to improper validation of unspecified malformed values within Microsoft Word. The processing of the document within Word could trigger memory corruption.
4. Microsoft Word RTF Malformed Control Word Variant 1 Remote Code Execution Vulnerability
(
CVE-2008-4027
)
The vulnerability is due to memory calculation errors when opening malformed . rtf files. An error condition may occur when the affected application processes malicious control word strings within . rtf files.
5. Microsoft Word RTF Malformed Control Word Variant 2 Remote Code Execution Vulnerability
(
CVE-2008-4028
)
The vulnerability is due to errors when calculating the required amount of memory when opening malformed . rtf files. An error condition may occur when the affected application processes malicious control word values within . rtf files.
6. Microsoft Word RTF Malformed Control Word Variant 3 Remote Code Execution Vulnerability
(
CVE-2008-4030
)
The vulnerability is due to errors when Microsoft Office calculates the required amount of memory when it opens malformed . rtf files or e-mails in RTF format.
7. Microsoft Word RTF Malformed String Remote Code Execution Vulnerability
(
CVE-2008-4031
)
The vulnerability is due to errors when calculating the required amount of memory when opening malformed . rtf files.
8. Microsoft Word Malformed Record Value Remote Code Execution Vulnerability
(
CVE-2008-4837
)
An unspecified error when parsing certain records can be exploited to corrupt memory via a specially crafted Word file.
Workaround
Use the Microsoft Office Isolated Conversion Environment MOICE when opening files from unknown or un-trusted sources Use Microsoft Office File Block policy to prevent the opening of Office 2003 and earlier documents received from unknown or un-trusted sources. Prevent Word from loading .rtf files. Do not open Email message or attachment from un-trusted sources. Do not open or save Microsoft Office files received from un-trusted sources.
For detailed steps and impact of applying these workarounds refer to Microsoft security Bulletin MS08-072
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
MS08-072
Vendor Information
Microsoft
http://www.microsoft.com/technet/security/Bulletin/MS08-072.mspx
References
Microsoft
http://www.microsoft.com/technet/security/Bulletin/MS08-072.mspx
SecurityTracker
http://securitytracker.com/alerts/2008/Dec/1021370.html
SANS Internet Storm Center
http://isc.sans.org/diary.html?storyid=5449
CVE Name
CVE-2008-4024
CVE-2008-4025
CVE-2008-4026
CVE-2008-4027
CVE-2008-4028
CVE-2008-4030
CVE-2008-4031
CVE-2008-4837
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-2436857
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|