Short Name |
HTTP:STC:DL:WORD-FONT |
---|---|
Severity |
Medium |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft Word Font Parsing Buffer Overflow |
Release Date |
2010/10/04 |
Update Number |
1784 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in Microsoft Word. An attacker can create a malicious Web site with Web pages containing dangerous Word files, which if accessed by a victim, allows the attacker gain control of the victim's computer.
Microsoft Word is affected by a remote buffer overflow vulnerability. This vulnerability presents itself when a .doc file contains specific malformed input. Upon attempting to read the malformed .doc file, the affected application fails to properly validate data within the file. This may result in the attacker being able to control the flow of program execution. Attackers may exploit this vulnerability to execute arbitrary code in the context of the victim user attempting to access the malformed Word file.