Short Name |
HTTP:STC:DL:WORD-STYLE-EXEC
|
Severity |
High
|
Recommended |
No
|
Recommended Action |
Drop
|
Category |
HTTP
|
Keywords |
Microsoft Word Cascading Style Sheet Processing Code Execution
|
Release Date |
2010/10/04
|
Update Number |
1784
|
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+
|
HTTP: Microsoft Word Cascading Style Sheet Processing Code Execution
This signature detects attempts to exploit a known vulnerability against Microsoft Word. A successful attack can lead to arbitrary code execution.
Extended Description
Microsoft Word is prone to a remote code-execution vulnerability.
An attacker could exploit this issue by enticing a victim to open a malicious Word file.
Successfully exploiting this issue would allow the attacker to execute arbitrary code in the context of the currently logged-in user.
Affected Products
- Microsoft Office 2003 SP1
- Microsoft Office 2003 SP2
- Microsoft Office 2003 SP3
- Microsoft Office 2003
- Microsoft Office 2004 for Mac
- Microsoft Office 2007 SP1
- Microsoft Office 2007
- Microsoft Office 2008 for Mac
- Microsoft Office Compatibility Pack 2007 SP1
- Microsoft Office Compatibility Pack 2007
- Microsoft Office XP SP1
- Microsoft Office XP SP2
- Microsoft Office XP SP3
- Microsoft Office XP
- Microsoft Outlook 2007
- Microsoft Outlook 2007 SP1
- Microsoft Word 2000 SP2
- Microsoft Word 2000 SP3
- Microsoft Word 2000 SR1
- Microsoft Word 2000 Sr1a
- Microsoft Word 2000
- Microsoft Word 2002 SP1
- Microsoft Word 2002 SP2
- Microsoft Word 2002 SP3
- Microsoft Word 2002
- Microsoft Word 2003 SP1
- Microsoft Word 2003 SP2
- Microsoft Word 2003 SP3
- Microsoft Word 2003
- Microsoft Word 2007 SP1
- Microsoft Word 2007
- Microsoft Word Viewer 2003 SP3
- Microsoft Word Viewer 2003
References