Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:DL:MS-PNG-IMG-CE

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Microsoft Office PNG Image Filter Code Execution

Release Date

2012/12/18

Update Number

2213

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Microsoft Office PNG Image Filter Code Execution


This signature detects attempts to exploit a known vulnerability against Microsoft Office. A successful attack can lead to arbitrary code execution.

Extended Description

Microsoft Office is prone to a remote code-execution vulnerability when handling a malformed PNG graphic file. The issue occurs when an Office application such as Excel, Word, or PowerPoint tries to open a malformed PNG graphic file. An attacker could exploit this vulnerability to cause memory corruption and subsequently to execute malicious code in the context of the user running the affected application.

Affected Products

  • Microsoft Office 2000 SP1
  • Microsoft Office 2000 SP2
  • Microsoft Office 2000 SP3
  • Microsoft Office 2000
  • Microsoft Office 2000 Chinese Version
  • Microsoft Office 2000 Japanese Version
  • Microsoft Office 2000 Korean Version
  • Microsoft Office 2003 SP1
  • Microsoft Office 2003 SP2
  • Microsoft Office 2003 SP3
  • Microsoft Office 2003
  • Microsoft Office XP SP1
  • Microsoft Office XP SP2
  • Microsoft Office XP SP3
  • Microsoft Office XP
  • Microsoft Project 2000
  • Microsoft Project 2002 SP1
  • Microsoft Project 2002

References

  • BugTraq: 18913
  • CVE: CVE-2006-0033

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out