Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:DL:WORD-SPRMTDIAGLINE

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Microsoft Office Word sprmTDiagLine80 Record Parsing Stack Buffer Overflow

Release Date

2010/10/25

Update Number

1798

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Microsoft Office Word sprmTDiagLine80 Record Parsing Stack Buffer Overflow


This signature detects attempts to exploit a known stack buffer overflow vulnerability in Microsoft Office Word. It is due to a boundary error while parsing a crafted Word document. An attack can exploited this by enticing a user to open a maliciously crafted file. In a successful attack, the injected code runs within the security context of the currently logged in user. In an unsuccessful attack, the vulnerable application can terminate abnormally.

Extended Description

Microsoft Word is prone to a remote code-execution vulnerability. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Word file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

Affected Products

  • Microsoft Office 2004 for Mac
  • Microsoft Office 2008 for Mac
  • Microsoft Office Compatibility Pack 2007 SP2
  • Microsoft Office Web Apps
  • Microsoft Open XML File Format Converter for Mac
  • Microsoft Word 2002 SP3
  • Microsoft Word 2003 SP3
  • Microsoft Word 2007 SP2
  • Microsoft Word 2010
  • Microsoft Word Viewer
  • Microsoft Word Web App

References

  • BugTraq: 43760
  • CVE: CVE-2010-3214

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out