TippingPoint Zero Day Initiative

(0day) Microsoft PowerPoint 2007 OfficeArt Atom Remote Code Execution Vulnerability

ZDI-11-044: February 7th, 2011


CVSS Score

Affected Vendors

Affected Products

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 11041. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Powerpoint 2007. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists with the way the application will parse external objects within an Office Art container. When parsing this object, the application will append an uninitialized object to a list. When destroying this object during document close (WM_DESTROY), the application will access a method that doesn't exist. This can lead to code execution under the context of the application.

Vendor Response

Microsoft states:

Patched April 12, 2011

Disclosure Timeline

    2010-07-20 - Vulnerability reported to vendor
    2011-02-07 - Coordinated public release of advisory


This vulnerability was discovered by: