CERT-In Vulnerability Note
CIVN-2010-0225
Windows Microsoft Foundation Class Document Title Updating Buffer Overflow Vulnerability
Original Issue Date:October 15, 2010
Severity Rating: LOW
Systems Affected
- Windows XP Service Pack 3
- Windows XP Professional x64 Edition Service Pack 2
- Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition Service Pack 2
- Windows Server 2003 with SP2 for Itanium-based Systems
- Windows Vista Service Pack 1 and Service Pack 2
- Windows Vista x64 Edition Service Pack 1 and Service Pack 2
- Windows Server 2008 for 32-bit Systems and Service Pack 2
- Windows Server 2008 for x64-based Systems and Pack 2
- Windows Server 2008 for Itanium-based Systems and Service Pack 2
- Windows 7 for 32-bit Systems
- Windows 7 for x64-based Systems
- Windows Server 2008 R2 for x64-based Systems
- Windows Server 2008 R2 for Itanium-based Systems
Overview
A vulnerability has been reported in Microsoft Foundation Class (MFC) Library which could allow an unauthenticated, remote attacker to execute arbitrary code on an affected system.
Description
The Microsoft Foundation Class (MFC) Library is an application framework for programming in Microsoft Windows written in C++. MFC provides code necessary to perform standard operations such as managing windows, menus, and dialog boxes; performing basic input/output, or storing collections of data objects. This vulnerability is caused due to improper processing of application requests by the MFC library. The MFC library fails to check input properly within window title rename requests. Microsoft applications installed by default on affected Windows systems do not use the MFC library. In order to affect from this vulnerability, system must contain a third-party application that utilizes the MFC library.
An unauthenticated, remote attacker could exploit this vulnerability by enticing users to open a malicious document within an application that uses the MFC library. The processing of malicious input within the document could trigger a buffer overflow condition resulting memory corruption. The attacker could take advantage of memory corruption condition to execute arbitrary code with the privileges of currently logged-in user.
Workaround
- Do not open document files received unexpectedly from trusted sources
- Read e-mails in plain text, if possible
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
MS10-074
Note: Microsoft Windows Server 2008 or Microsoft Windows Server 2008 R2 installed using Server core installation option are not affected with this vulnerability.
Vendor Information
Microsoft
http://www.microsoft.com/technet/security/bulletin/ms10-074.mspx
References
Microsoft
http://www.microsoft.com/technet/security/bulletin/ms10-074.mspx
Security Tracker
http://securitytracker.com/alerts/2010/Oct/1024557.html
CISCO
http://tools.cisco.com/security/center/viewAlert.x?alertId=21514
VUPEN
http://www.vupen.com/english/advisories/2010/2621
CVE Name
CVE-2010-3227
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|