CERT-In Vulnerability Note
CIVN-2011-0186
Microsoft Windows OLE Remote Code Execution Vulnerability
Original Issue Date:December 14, 2011
Severity Rating: HIGH
Systems Affected
- Windows XP Service Pack 3
- Windows XP Professional x64 Edition Service Pack 2
- Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition Service Pack 2
- Windows Server 2003 with SP2 for Itanium-based Systems
Overview
A vulnerability has been reported in Object Linking and Embedding (OLE) which could be exploited by remote attackers to execute arbitrary code on affected systems.
Description
The vulnerability is caused due to an error when handling certain properties of an OLE objects. Successful exploitation of this issue could lead to remote code execution.
An attacker could exploit this vulnerability by crafting a file containing OLE object and tricking the user to open the same. Once exploited, the attacker could gain the rights of currently the logged-on user.
Workaround
- Do not open Office files received from untrusted sources
- Exercise caution while opening the files received unexpectedly from trusted sources.
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
MS11-093
Vendor Information
Microsoft Corporations
http://technet.microsoft.com/en-us/security/bulletin/ms11-093
References
ISC SANS
http://isc.sans.org/diary/December+2011+Microsoft+Black+Tuesday+Summary/12193
Secunia
http://secunia.com/advisories/47207/
SecurityTracker
http://www.securitytracker.com/id/1026418
CVE Name
CVE-2011-3400
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|