Short Name |
HTTP:STC:DL:CGM-IMG-BOF |
---|---|
Severity |
Critical |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft Office CGM Image Converter Buffer Overflow (1) |
Release Date |
2011/01/18 |
Update Number |
1850 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in Microsoft Office. It is due to the way Office allocates a buffer size when handling CGM image files. An attacker can leverage this by enticing a target user to open a malicious file. A successful attack can allow an attacker to execute arbitrary code in the security context of the logged in user. An unsuccessful attack can cause an abnormal termination of the affected product.
Microsoft Office is prone to a remote buffer-overflow vulnerability because the software fails to perform adequate boundary-checks on user-supplied data. An attacker can exploit this issue by enticing an unsuspecting user into opening an Office document containing a specially crafted Computer Graphics Metafile (CGM) image. Successfully exploiting this issue allows attackers to execute arbitrary code in the context of the currently logged-in user. Failed exploit attempts will result in a denial-of-service condition.