Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:DL:WORD-RTF-MEM

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Microsoft Word RTF File Handling Memory Corruption

Release Date

2010/10/25

Update Number

1798

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Microsoft Word RTF File Handling Memory Corruption


This signature detects attempts to exploit a known heap overflow vulnerability in the way Microsoft Word and Microsoft Outlook process Rich Text Format (RTF) files. It is due to an integer overflow while parsing Control Words inside a malicious RTF file. A remote attacker can exploit this by enticing the target user to open a crafted RTF file or an RTF formatted e-mail using the affected applications, potentially causing arbitrary code to be injected and executed in the security context of the current user. In a successful attack, the behavior of the target depends on the intention of the attacker. In an unsuccessful code execution attack, the affected product terminates resulting in the loss of any unsaved data from the current session.

Extended Description

Microsoft Word is prone to a remote code-execution vulnerability. An attacker could exploit this issue by enticing a victim to open a malicious RTF file. Successfully exploiting this issue would allow the attacker to execute arbitrary code in the context of the currently logged-in user.

Affected Products

  • Microsoft Office 2003 SP1
  • Microsoft Office 2003 SP2
  • Microsoft Office 2003 SP3
  • Microsoft Office 2003
  • Microsoft Office 2004 for Mac
  • Microsoft Office 2007 SP1
  • Microsoft Office 2007
  • Microsoft Office 2008 for Mac
  • Microsoft Office Compatibility Pack 2007 SP1
  • Microsoft Office Compatibility Pack 2007
  • Microsoft Office XP SP1
  • Microsoft Office XP SP2
  • Microsoft Office XP SP3
  • Microsoft Office XP
  • Microsoft Outlook 2007
  • Microsoft Outlook 2007 SP1
  • Microsoft Word 2000 SP2
  • Microsoft Word 2000 SP3
  • Microsoft Word 2000 SR1
  • Microsoft Word 2000 Sr1a
  • Microsoft Word 2000
  • Microsoft Word 2002 SP1
  • Microsoft Word 2002 SP2
  • Microsoft Word 2002 SP3
  • Microsoft Word 2002
  • Microsoft Word 2003 SP1
  • Microsoft Word 2003 SP2
  • Microsoft Word 2003 SP3
  • Microsoft Word 2003
  • Microsoft Word 2007 SP1
  • Microsoft Word 2007
  • Microsoft Word Viewer 2003 SP3
  • Microsoft Word Viewer 2003

References

  • BugTraq: 29104
  • CVE: CVE-2008-1091

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out