CERT-In Vulnerability Note
CIVN-2012-0099
Microsoft Works Heap Remote Code Execution Vulnerability
Original Issue Date:October 10, 2012
Severity Rating: HIGH
Systems Affected
Overview
A vulnerability has been reported in the Microsoft Works , which could be exploited by remote attackers to execute arbitrary code to take control of the affected system in the context of the current logged-in user.
Description
This vulnerability exists due to improper heap-bond memory operations while handling Microsoft Word DOC files. A remote attacker could exploit this vulnerability by convincing a user to visit malicious site or open a specially crafted RTF document.
Successful exploitation of this vulnerability could allow the remote attacker to execute arbitrary code to take control of the affected in the context of currently logged-in user.
Workaround
- Use MOICE.
- Deploy EMET.
- Do not open Word files that you receive from untrusted sources or that you receive unexpectedly from trusted sources. This vulnerability could be exploited when a user opens a specially crafted file.
- Use caution when clicking on links to web pages.
- Protect yourself against social engineering attacks.
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
MS12-065
Vendor Information
Microsoft
http://technet.microsoft.com/en-us/security/bulletin/ms12-065
References
SecurityFocus
http://www.securityfocus.com/bid/55796/
Cisco
http://tools.cisco.com/security/center/viewAlert.x?alertId=27093
Symantec
http://www.symantec.com/security_response/vulnerability.jsp?bid=55796&om_rssid=sr-advisories
CVE Name
CVE-2012-2550
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|