Short Name |
HTTP:STC:PPT-CRAFTED-PATH |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft Office PowerPoint File Path Handling Buffer Overflow |
Release Date |
2010/10/14 |
Update Number |
1792 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
A stack buffer overflow vulnerability exists in Microsoft Office PowerPoint. The vulnerability is due to the way that the vulnerable application handles specially crafted file paths. This vulnerability may be exploited by remote unauthenticated attackers by enticing a user to open a maliciously crafted file. In attack scenarios where code execution is successful the behaviour of the target machine is completely dependent on the intention of the injected code, which will run in the security context of the currently logged in user. In cases where code execution is not successful the affected product may terminate abnormally.
Microsoft PowerPoint is prone to a remote code-execution vulnerability. An attacker can exploit this issue by enticing a victim to open a malicious PowerPoint file. Successful exploits would allow the attacker to execute arbitrary code in the context of the currently logged-in user.