Microsoft PowerPoint unspecified mso.dll code execution
|powerpoint-mso-code-execution2 (27781)||High Risk|
Microsoft PowerPoint could allow a remote attacker to execute arbitrary code on the system, caused by an unspecified memory corruption vulnerability in the mso.dll library. A remote attacker could exploit this vulnerability by persuading a victim to open a malicious PowerPoint presentation (.ppt) either by sending the malicious file to a victim as an email attachment or hosting it on a Web site.
Note: This is different than the vulnerability described in CVE-2006-3590.
No remedy available as of September 1, 2014.
- BugTraq Mailing List, Sat Jul 15 2006 - 03:16:34 CDT: MS Power Point Multiple Vulnerabilities - (mso.dll) POC.
- BID-18993: Microsoft Powerpoint Multiple Unspecified Vulnerabilities
- CVE-2006-3655: Unspecified vulnerability in mso.dll in Microsoft PowerPoint 2003 allows user-assisted attackers to execute arbitrary code via a crafted PowerPoint file. NOTE: due to the lack of available details as of 20060717, it is unclear how this is related to CVE-2006-3656, CVE-2006-3660, and CVE-2006-3590, although it is possible that they are all different.
- OSVDB ID: 27325: Microsoft PowerPoint mso.dll PPT Processing Unspecified Code Execution
- OSVDB ID: 27326: Microsoft PowerPoint powerpnt.exe Unspecified Issue
- OSVDB ID: 27327: Microsoft PowerPoint PPT File Closure Memory Corruption
- SA21061: Microsoft PowerPoint Memory Corruption Vulnerability
- Microsoft PowerPoint 2003
Jul 15, 2006
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this
* According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall IBM be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.