Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:DL:PUB-TEXTBOX

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Microsoft Office Publisher File Conversion TextBox Processing Buffer Overflow

Release Date

2010/10/25

Update Number

1798

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Microsoft Office Publisher File Conversion TextBox Processing Buffer Overflow


This signature detects attempts to exploit a known stack buffer overflow vulnerability in Microsoft Office Publisher. It is due to the way Publisher parses certain values in a Microsoft Publisher file. Remote attackers can exploit this by enticing the target user to open a malicious file. A successful attack can result in execution of arbitrary code within the security context of the currently logged in user. An unsuccessful attempt terminates the affected application abnormally.

Extended Description

Microsoft Publisher is prone to a remote buffer-overflow vulnerability. An attacker can exploit this issue by enticing a victim to open a malicious Publisher file. Successfully exploiting this issue would allow an attacker to execute arbitrary code in the context of the currently logged-in user.

Affected Products

  • Microsoft Publisher 2002 SP3
  • Microsoft Publisher 2002
  • Microsoft Publisher 2003 SP2
  • Microsoft Publisher 2003 SP3
  • Microsoft Publisher 2003
  • Microsoft Publisher 2007 SP1
  • Microsoft Publisher 2007 SP2
  • Microsoft Publisher 2007

References

  • BugTraq: 39347
  • CVE: CVE-2010-0479

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out