Short Name |
HTTP:STC:DL:WORD-RTF-CONTROL |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft Word dpcallout RTF Control Word Handling Buffer Overflow |
Release Date |
2010/10/20 |
Update Number |
1795 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known buffer overflow vulnerability in Microsoft Word products. It is due to an logic error when processing RTF documents that contain unexpected control words following a dpcallout control word. A remote attacker can exploit this by enticing the target user to open a crafted RTF file. A successful attack can lead to arbitrary code injection and execution within the security context of the currently logged on user. The behavior of the target depends on the intention of the attacker. In an unsuccessful attack, the affected product terminates resulting in the loss of any unsaved data from the current session.
Microsoft Word is prone to a remote code-execution vulnerability. An attacker could exploit this issue by enticing a victim to open a malicious RTF file. Successfully exploiting this issue would allow the attacker to execute arbitrary code in the context of the currently logged-in user.