_____ 发件人: SecuriTeam [mailto:[EMAIL PROTECTED] 发送时间: 2008年5月14日 3:01 收件人: [EMAIL PROTECTED] 主题: [NT] Vulnerabilities in Microsoft Word Allows Code Execution (MS08-026)
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com - - promotion The SecuriTeam alerts list - Free, Accurate, Independent. Get your security news from a reliable source. http://www.securiteam.com/mailinglist.html - - - - - - - - - Vulnerabilities in Microsoft Word Allows Code Execution (MS08-026) This security update resolves several privately reported vulnerabilities in Microsoft Word that could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This security update is rated Critical for supported editions of Microsoft Word 2000 and Microsoft Outlook 2007 and rated Important for supported editions of Microsoft Word 2002; Microsoft Word 2003; Microsoft Word Viewer 2003 and Microsoft Word Viewer 2003 Service Pack 3; Microsoft Word 2007; Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats; and Microsoft Office 2004 for Mac and Microsoft Office 2008 for Mac. For more information, see the subsection, Affected and Non-Affected Software, in this section. Affected Software: Microsoft Office Suites and Components * Microsoft Office 2000 Service Pack 3 - Microsoft <http://www.microsoft.com/downloads/details.aspx?FamilyId=9215ff71-38c0-416a -b89a-fe3474160f41> Word 2000 Service Pack 3 (KB950250) - Remote Code Execution - Critical - MS08-009 * Microsoft Office XP Service Pack 3 - Microsoft <http://www.microsoft.com/downloads/details.aspx?FamilyId=b348a518-221e-4567 -a797-999715a8b2ef> Word 2002 Service Pack 3 (KB950243) - Remote Code Execution - Important - MS08-009 * Microsoft Office 2003 Service Pack 2 - Microsoft <http://www.microsoft.com/downloads/details.aspx?FamilyId=bc33d144-f917-47b8 -961f-744ca847e14c> Word 2003 Service Pack 2 (KB950241) - Remote Code Execution - Important - MS08-009 * Microsoft Office 2003 Service Pack 3 - Microsoft <http://www.microsoft.com/downloads/details.aspx?FamilyId=bc33d144-f917-47b8 -961f-744ca847e14c> Word 2003 Service Pack 3 (KB950241) - Remote Code Execution - Important - MS08-009 * 2007 Microsoft Office System - Microsoft <http://www.microsoft.com/downloads/details.aspx?FamilyId=071ceaa2-12e3-4401 -9331-2a54a93e2550> Word 2007 (KB950113) - Remote Code Execution - Important - None * Microsoft Office 2003 Service Pack 3 - Microsoft <http://www.microsoft.com/downloads/details.aspx?FamilyId=071ceaa2-12e3-4401 -9331-2a54a93e2550> Outlook 2007 (KB950113) - Remote Code Execution - Critical - None * 2007 Microsoft Office System Service Pack 1 - Microsoft <http://www.microsoft.com/downloads/details.aspx?FamilyId=071ceaa2-12e3-4401 -9331-2a54a93e2550> Word 2007 Service Pack 1 (KB950113) - Remote Code Execution - Important - None * 2007 Microsoft Office System Service Pack 1 - Microsoft <http://www.microsoft.com/downloads/details.aspx?FamilyId=071ceaa2-12e3-4401 -9331-2a54a93e2550> Outlook 2007 Service Pack 1 (KB950113) - Remote Code Execution - Critical - None Other Office Software * Microsoft <http://www.microsoft.com/downloads/details.aspx?FamilyId=bce7ea31-2bf0-4930 -aff9-837bcc82a682> Word Viewer 2003 (KB950625) - Not applicable - Remote Code Execution - Important - MS08-009 * Microsoft <http://www.microsoft.com/downloads/details.aspx?FamilyId=bce7ea31-2bf0-4930 -aff9-837bcc82a682> Word Viewer 2003 Service Pack 3 (KB950625) - Not applicable - Remote Code Execution - Important - MS07-024 * Microsoft <http://www.microsoft.com/downloads/details.aspx?FamilyId=2d718f37-c5d1-4e15 -a7e1-5a15fedef52f> Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats (KB951808) - Not applicable - Remote Code Execution - Important - None * Microsoft <http://www.microsoft.com/downloads/details.aspx?FamilyId=2d718f37-c5d1-4e15 -a7e1-5a15fedef52f> Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Service Pack 1 (KB951808) - Not applicable - Remote Code Execution - Important - None Microsoft Office for Mac * Microsoft <http://www.microsoft.com/downloads/details.aspx?FamilyId=99F54471-CCF9-4D94 -A882-A05ECD128ADC> Office 2004 for Mac (KB952332) - Not applicable - Remote Code Execution - Important - MS08-014 * Microsoft <http://www.microsoft.com/downloads/details.aspx?FamilyId=395D1487-A3A6-4106 -A0F8-4D6E1D6D89D2> Office 2008 for Mac (KB952331) - Not applicable - Remote Code Execution - Important - MS08-014 Non-Affected Software: * Microsoft Works 8.0 * Microsoft Works 8.5 * Microsoft Works 9.0 * Microsoft Works Suite 2005 * Microsoft Works Suite 2006 Object Parsing Vulnerability - CVE-2008-1091 A remote code execution vulnerability exists in the way that Microsoft Office handles specially crafted Rich Text Format (.rtf) files. The vulnerability could allow remote code execution if a user opens a specially crafted .rtf file with malformed strings in Word or previews a specially crafted .rtf file with malformed strings in rich text e-mail. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. CVE Information: CVE-2008-1091 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1091> Word Cascading Style Sheet (CSS) Vulnerability - CVE-2008-1434 A remote code execution vulnerability exists in the way that Microsoft Word handles specially crafted Word files. The vulnerability could allow remote code execution if a user opens a specially crafted Word file that includes a malformed CSS value. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. CVE Information: CVE-2008-1434 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1434> Mitigating Factors: Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors may be helpful in your situation: * In a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. * An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. * Users who have installed and are using the Office Document Open Confirmation Tool for Office 2000 will be prompted with Open, Save, or Cancel before opening a document. The features of the Office Document Open Confirmation Tool are incorporated in Office XP and later editions of Office. Workarounds: Workaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality. * Use Microsoft Office File Block policy to prevent the opening of Office 2003 and earlier documents from unknown or untrusted sources and locations. The following registry scripts can be used to set the File Block policy. Note Modifying the Registry incorrectly can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems resulting from incorrect modification of the Registry can be solved. Modify the Registry at your own risk. For Office 2003 Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Word\Security\FileOpenBloc k] "HTMLFiles"=dword:00000001 Note In order to use 'FileOpenBlock' with Office 2003, all of the latest Office 2003 security updates as of May 2007 must be applied. Impact of Workaround: Users who have configured the File Block policy and have not configured a special exempt directory as discussed in Microsoft Knowledge Base Article 922848 will be unable to open HTML documents in Word or Outlook. How to undo the workaround: Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Word\Security\FileOpenBloc k] "HTMLFiles"=dword:00000000 For Office 2007 Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Policies\Microsoft\Office\12.0\Word\Security\Fil eOpenBlock] "HTMLFiles"=dword:00000001 Note In order to use 'FileOpenBlock' with Office 2007, all of the latest Office 2007 security updates as of May 2007 must be applied. Impact of Workaround: Users who have configured the File Block policy and have not configured a special exempt directory as discussed in Microsoft Knowledge Base Article 922848 will be unable to open HTML documents in Word 2003 or 2007 Microsoft Office System. How to undo the workaround: Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Policies\Microsoft\Office\12.0\Word\Security\Fil eOpenBlock] "HTMLFiles"=dword:00000000 * Do not open or save Microsoft Office files that you receive from untrusted sources or that you receive unexpectedly from trusted sources. This vulnerability could be exploited when a user opens a specially crafted file. Additional Information: The information has been provided by Microsoft Product Security. The original article can be found at: http://www.microsoft.com/technet/security/bulletin/ms08-026.mspx ============================================================================ ==== This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [EMAIL PROTECTED] In order to subscribe to the mailing list and receive advisories in HTML format, simply forward this email to: [EMAIL PROTECTED] ============================================================================ ==== ============================================================================ ==== DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. --~--~---------~--~----~------------~-------~--~----~ 要向邮件组发送邮件,请发到 [email protected] 要退订此邮件,请发邮件至 [EMAIL PROTECTED] -~----------~----~----~----~------~----~------~--~---

