Short Name |
SMTP:WP5-EMAIL |
---|---|
Severity |
Medium |
Recommended |
No |
Category |
SMTP |
Keywords |
WordPerfect 5.x Document Download |
Release Date |
2004/09/15 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects downloads of WordPerfect 5.x files through SMTP. A vulnerability exists in the WordPerfect 5.x converter. Attackers can send a malformed WordPerfect file in an e-mail message. If the user has Microsoft Office, Publisher, Works, FrontPage 2000 or higher installed, Microsoft Word attempts to open the document and the vulnerability can be triggered.
Microsoft WordPerfect Converter is reported prone to a remote buffer overflow vulnerability when handling malformed files. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable computer to gain unauthorized access. To carry out an attack, the attacker may create a malicious file and entice a user to open the file through an application that employs WordPerfect Converter. Microsoft WordPerfect Converter is installed by default in various versions of Microsoft Office, Microsoft Word, Microsoft FrontPage, Microsoft Publisher, and Microsoft Works Suite. Microsoft Office 2003 Service Pack 1 is not affected by this vulnerability. This issue may be similar in nature to BID 8538 (Microsoft WordPerfect Converter Buffer Overrun Vulnerability).