CERT-In Vulnerability Note
CIVN-2010-0267
Microsoft Office SharePoint Remote Code Execution Vulnerability
Original Issue Date:December 15, 2010
Severity Rating: MEDIUM
Systems Affected
- Microsoft Office SharePoint Server 2007 Service Pack 2 (32-bit editions)
- Microsoft Office SharePoint Server 2007 Service Pack 2 (64-bit editions)
Overview
A vulnerability has been reported in Microsoft SharePoint, which could be exploited by attackers to compromise a vulnerable system.
Description
The vulnerability exists due to improper processing of SOAP requests by the SharePoint Office Document Conversions Launcher service.
An unauthenticated, remote attacker could exploit this vulnerability by sending malicious SOAP requests to the targeted application. When processed, the requests could trigger the execution of arbitrary code on the targeted system with the limited privileges of the guest account.
Workaround
- Stop and Disable Office Document Conversions Launcher Service
- Block ports used by the Office Document Conversions Launcher Service at the firewall
For detailed steps and impact of applying these workarounds refer to Microsoft Security bulletin MS10-104
Solution
Apply patches as mentioned in Microsoft Security bulletin
MS10-104
Vendor Information
Microsoft
http://www.microsoft.com/technet/security/bulletin/ms10-104.mspx
References
Microsoft
http://www.microsoft.com/technet/security/bulletin/ms10-104.mspx
Cisco
http://tools.cisco.com/security/center/viewAlert.x?alertId=21975
Vupen
http://www.vupen.com/english/advisories/2010/3226
Secunia
http://secunia.com/advisories/42631/
CVE Name
CVE-2010-3964
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|