Advisory Details

February 7th, 2011

(0Day) Microsoft PowerPoint 2007 OfficeArt Atom Remote Code Execution Vulnerability

ZDI-11-044
ZDI-CAN-827

CVE ID CVE-2011-0976
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS Microsoft
AFFECTED PRODUCTS Office PowerPoint
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['11041']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Powerpoint 2007. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists with the way the application will parse external objects within an Office Art container. When parsing this object, the application will append an uninitialized object to a list. When destroying this object during document close (WM_DESTROY), the application will access a method that doesn't exist. This can lead to code execution under the context of the application.

ADDITIONAL DETAILS

Patched April 12, 2011
http://www.microsoft.com/technet/security/Bulletin/MS11-022.mspx


DISCLOSURE TIMELINE
  • 2010-07-20 - Vulnerability reported to vendor
  • 2011-02-07 - Coordinated public release of advisory
CREDIT Anonymous
BACK TO ADVISORIES