Short Name |
HTTP:STC:DL:WORKS-WPS-OF |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft Office Works File Converter WPS File Field Length Stack Overflow |
Release Date |
2010/09/24 |
Update Number |
1779 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in Microsoft Office. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the process' user.
Microsoft Works File Converter is prone to a remote code-execution vulnerability because it fails to adequately validate user-supplied input. An attacker could exploit this issue by enticing a victim to open a malicious '.wps' file. Successfully exploiting this issue would allow the attacker to execute arbitrary code in the context of the currently logged-in user.