Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:DL:CGM-IMG-BOF

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Microsoft Office CGM Image Converter Buffer Overflow (1)

Release Date

2011/01/18

Update Number

1850

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Microsoft Office CGM Image Converter Buffer Overflow (1)


This signature detects attempts to exploit a known vulnerability in Microsoft Office. It is due to the way Office allocates a buffer size when handling CGM image files. An attacker can leverage this by enticing a target user to open a malicious file. A successful attack can allow an attacker to execute arbitrary code in the security context of the logged in user. An unsuccessful attack can cause an abnormal termination of the affected product.

Extended Description

Microsoft Office is prone to a remote buffer-overflow vulnerability because the software fails to perform adequate boundary-checks on user-supplied data. An attacker can exploit this issue by enticing an unsuspecting user into opening an Office document containing a specially crafted Computer Graphics Metafile (CGM) image. Successfully exploiting this issue allows attackers to execute arbitrary code in the context of the currently logged-in user. Failed exploit attempts will result in a denial-of-service condition.

Affected Products

  • Microsoft Office 2003 SP1
  • Microsoft Office 2003 SP2
  • Microsoft Office 2003 SP3
  • Microsoft Office 2003
  • Microsoft Office Converter Pack
  • Microsoft Office XP SP1
  • Microsoft Office XP SP2
  • Microsoft Office XP SP3
  • Microsoft Office XP

References

  • BugTraq: 45270
  • CVE: CVE-2010-3945

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out