Microsoft PowerPoint mso.dll malformed shape code execution
|powerpoint-mso-code-execution (27740)||High Risk|
Microsoft PowerPoint could allow a remote attacker to execute arbitrary code on the system, caused by a memory corruption vulnerability in the mso.dll library. A remote attacker could exploit this vulnerability by persuading a victim to open a malicious PowerPoint presentation (.ppt) containing a malformed shape, either by sending the malicious file to a victim as an email attachment or hosting it on a Web site.
Note: It has been reported that this vulnerability is being exploited by the PPDropper.B Trojan.
Microsoft originally provided a patch for this vulnerability in Microsoft Security Bulletin MS06-048, but it has been superseded by the patch released with MS06-062. See References.
- Microsoft Security Advisory (922970): Vulnerability in PowerPoint Could Allow Remote Code Execution.
- Microsoft Security Bulletin MS06-048: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (922968).
- Microsoft Security Bulletin MS06-062: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (922581).
- Microsoft Security Response Center Blog Friday, July 14, 2006 10:49 PM: Information on the recent Powerpoint vulnerability..
- SecuriTeam Blog - July 14, 2006 on 3:26 pm : Microsoft PowerPoint 0-day Vulnerability FAQ.
- US-CERT Technical Cyber Security Alert TA06-220A: Microsoft Windows, Office, and Internet Explorer Vulnerabilities.
- ASA-2006-154: Windows Security Updates for August 2006 - (MS06-040 - MS06-051)
- BID-18957: Microsoft Powerpoint Remote Code Execution Vulnerability
- CVE-2006-3590: mso.dll, as used by Microsoft PowerPoint 2000 through 2003, allows user-assisted attackers to execute arbitrary commands via a malformed shape container in a PPT file that leads to memory corruption, as exploited by Trojan.PPDropper.B, a different issue than CVE-2006-1540 and CVE-2006-3493.
- OSVDB ID: 27324: Microsoft PowerPoint mso.dll PPT Processing Arbitrary Code Execution
- SA21040: Microsoft PowerPoint Code Execution Vulnerabilities
- SECTRACK ID: 1016496: Microsoft PowerPoint `mso.dll` Buffer Overflow May Let Remote Users Execute Arbitrary Code
- US-CERT VU#936945: Microsoft PowerPoint does not properly handle malformed shapes
- Microsoft PowerPoint 2000
- Microsoft PowerPoint 2002
- Microsoft PowerPoint 2003
- Microsoft PowerPoint 2004 Mac OS
- Microsoft PowerPoint X Mac OS
Jul 13, 2006
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this
* According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall IBM be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.