哪有利用代码

2008/5/14, 大风 <[EMAIL PROTECTED]>:
>
>   ------------------------------
>
> *发件人:* SecuriTeam [mailto:[EMAIL PROTECTED]
> *发送时间:* 2008年5月14日 3:01
> *收件人:* [EMAIL PROTECTED]
> *主题:* [NT] Vulnerabilities in Microsoft Word Allows Code Execution
> (MS08-026)
>
>
>
> The following security advisory is sent to the securiteam mailing list,
> and can be found at the SecuriTeam web site: http://www.securiteam.com
>
> - - promotion
>
> The SecuriTeam alerts list - Free, Accurate, Independent.
>
> Get your security news from a reliable source.
> http://www.securiteam.com/mailinglist.html
>
>
> - - - - - - - - -
> *Vulnerabilities in Microsoft Word Allows Code Execution (MS08-026) *
>
> This security update resolves several privately reported vulnerabilities
> in Microsoft Word that could allow remote code execution if a user opens a
> specially crafted Word file. An attacker who successfully exploited these
> vulnerabilities could take complete control of an affected system. An
> attacker could then install programs; view, change, or delete data; or
> create new accounts with full user rights. Users whose accounts are
> configured to have fewer user rights on the system could be less impacted
> than users who operate with administrative user rights.
>
> This security update is rated Critical for supported editions of Microsoft
> Word 2000 and Microsoft Outlook 2007 and rated Important for supported
> editions of Microsoft Word 2002; Microsoft Word 2003; Microsoft Word Viewer
> 2003 and Microsoft Word Viewer 2003 Service Pack 3; Microsoft Word 2007;
> Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007
> File Formats; and Microsoft Office 2004 for Mac and Microsoft Office 2008
> for Mac. For more information, see the subsection, Affected and Non-Affected
> Software, in this section.
>
> *Affected Software:*
> *Microsoft Office Suites and Components*
>  * Microsoft Office 2000 Service Pack 3 - Microsoft Word 2000 Service Pack
> 3<http://www.microsoft.com/downloads/details.aspx?FamilyId=9215ff71-38c0-416a-b89a-fe3474160f41>(KB950250)
>  - Remote Code Execution - Critical - MS08-009
>  * Microsoft Office XP Service Pack 3 - Microsoft Word 2002 Service Pack 
> 3<http://www.microsoft.com/downloads/details.aspx?FamilyId=b348a518-221e-4567-a797-999715a8b2ef>(KB950243)
>  - Remote Code Execution - Important - MS08-009
>  * Microsoft Office 2003 Service Pack 2 - Microsoft Word 2003 Service Pack
> 2<http://www.microsoft.com/downloads/details.aspx?FamilyId=bc33d144-f917-47b8-961f-744ca847e14c>(KB950241)
>  - Remote Code Execution - Important - MS08-009
>  * Microsoft Office 2003 Service Pack 3 - Microsoft Word 2003 Service Pack
> 3<http://www.microsoft.com/downloads/details.aspx?FamilyId=bc33d144-f917-47b8-961f-744ca847e14c>(KB950241)
>  - Remote Code Execution - Important - MS08-009
>  * 2007 Microsoft Office System - Microsoft Word 
> 2007<http://www.microsoft.com/downloads/details.aspx?FamilyId=071ceaa2-12e3-4401-9331-2a54a93e2550>(KB950113)
>  - Remote Code Execution - Important - None
>  * Microsoft Office 2003 Service Pack 3 - Microsoft Outlook 
> 2007<http://www.microsoft.com/downloads/details.aspx?FamilyId=071ceaa2-12e3-4401-9331-2a54a93e2550>(KB950113)
>  - Remote Code Execution - Critical - None
>  * 2007 Microsoft Office System Service Pack 1 - Microsoft Word 2007
> Service Pack 
> 1<http://www.microsoft.com/downloads/details.aspx?FamilyId=071ceaa2-12e3-4401-9331-2a54a93e2550>(KB950113)
>  - Remote Code Execution - Important - None
>  * 2007 Microsoft Office System Service Pack 1 - Microsoft Outlook 2007
> Service Pack 
> 1<http://www.microsoft.com/downloads/details.aspx?FamilyId=071ceaa2-12e3-4401-9331-2a54a93e2550>(KB950113)
>  - Remote Code Execution - Critical - None
> *Other Office Software*
>  * Microsoft Word Viewer 
> 2003<http://www.microsoft.com/downloads/details.aspx?FamilyId=bce7ea31-2bf0-4930-aff9-837bcc82a682>(KB950625)
>  - Not applicable - Remote Code Execution - Important - MS08-009
>  * Microsoft Word Viewer 2003 Service Pack 
> 3<http://www.microsoft.com/downloads/details.aspx?FamilyId=bce7ea31-2bf0-4930-aff9-837bcc82a682>(KB950625)
>  - Not applicable - Remote Code Execution - Important - MS07-024
>  * Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint
> 2007 File 
> Formats<http://www.microsoft.com/downloads/details.aspx?FamilyId=2d718f37-c5d1-4e15-a7e1-5a15fedef52f>(KB951808)
>  - Not applicable - Remote Code Execution - Important - None
>  * Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint
> 2007 File Formats Service Pack 
> 1<http://www.microsoft.com/downloads/details.aspx?FamilyId=2d718f37-c5d1-4e15-a7e1-5a15fedef52f>(KB951808)
>  - Not applicable - Remote Code Execution - Important - None
> *Microsoft Office for Mac*
>  * Microsoft Office 2004 for 
> Mac<http://www.microsoft.com/downloads/details.aspx?FamilyId=99F54471-CCF9-4D94-A882-A05ECD128ADC>(KB952332)
>  - Not applicable - Remote Code Execution - Important - MS08-014
>  * Microsoft Office 2008 for 
> Mac<http://www.microsoft.com/downloads/details.aspx?FamilyId=395D1487-A3A6-4106-A0F8-4D6E1D6D89D2>(KB952331)
>  - Not applicable - Remote Code Execution - Important - MS08-014
>
> *Non-Affected Software:*
>  * Microsoft Works 8.0
>  * Microsoft Works 8.5
>  * Microsoft Works 9.0
>  * Microsoft Works Suite 2005
>  * Microsoft Works Suite 2006
>
> *Object Parsing Vulnerability - CVE-2008-1091*
> A remote code execution vulnerability exists in the way that Microsoft
> Office handles specially crafted Rich Text Format (.rtf) files. The
> vulnerability could allow remote code execution if a user opens a specially
> crafted .rtf file with malformed strings in Word or previews a specially
> crafted .rtf file with malformed strings in rich text e-mail. An attacker
> who successfully exploited this vulnerability could take complete control of
> an affected system. An attacker could then install programs; view, change,
> or delete data; or create new accounts with full user rights.
>
> *CVE Information:*
> CVE-2008-1091<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1091>
>
> *Word Cascading Style Sheet (CSS) Vulnerability - CVE-2008-1434*
> A remote code execution vulnerability exists in the way that Microsoft
> Word handles specially crafted Word files. The vulnerability could allow
> remote code execution if a user opens a specially crafted Word file that
> includes a malformed CSS value. An attacker who successfully exploited this
> vulnerability could take complete control of an affected system. An attacker
> could then install programs; view, change, or delete data; or create new
> accounts with full user rights.
>
> *CVE Information:*
> CVE-2008-1434<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1434>
>
> *Mitigating Factors:*
> Mitigation refers to a setting, common configuration, or general
> best-practice, existing in a default state, that could reduce the severity
> of exploitation of a vulnerability. The following mitigating factors may be
> helpful in your situation:
>
>  * In a Web-based attack scenario, an attacker could host a Web site that
> contains a Web page that is used to exploit this vulnerability. In addition,
> compromised Web sites and Web sites that accept or host user-provided
> content or advertisements could contain specially crafted content that could
> exploit this vulnerability. In all cases, however, an attacker would have no
> way to force users to visit these Web sites. Instead, an attacker would have
> to persuade users to visit the Web site, typically by getting them to click
> a link in an e-mail message or Instant Messenger message that takes users to
> the attacker's Web site.
>
>  * An attacker who successfully exploited this vulnerability could gain
> the same user rights as the local user. Users whose accounts are configured
> to have fewer user rights on the system could be less impacted than users
> who operate with administrative user rights.
>
>  * Users who have installed and are using the Office Document Open
> Confirmation Tool for Office 2000 will be prompted with Open, Save, or
> Cancel before opening a document. The features of the Office Document Open
> Confirmation Tool are incorporated in Office XP and later editions of
> Office.
>
> *Workarounds:*
> Workaround refers to a setting or configuration change that does not
> correct the underlying vulnerability but would help block known attack
> vectors before you apply the update. Microsoft has tested the following
> workarounds and states in the discussion whether a workaround reduces
> functionality.
>
>  * Use Microsoft Office File Block policy to prevent the opening of Office
> 2003 and earlier documents from unknown or untrusted sources and locations.
>
> The following registry scripts can be used to set the File Block policy.
>
> *Note* Modifying the Registry incorrectly can cause serious problems that
> may require you to reinstall your operating system. Microsoft cannot
> guarantee that problems resulting from incorrect modification of the
> Registry can be solved. Modify the Registry at your own risk.
>
> For Office 2003
>
> Windows Registry Editor Version 5.00
>
> [HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Word\Security\FileOpenBlock]
>
>
> "HTMLFiles"=dword:00000001
>
> *Note* In order to use 'FileOpenBlock' with Office 2003, all of the latest
> Office 2003 security updates as of May 2007 must be applied.
>
> *Impact of Workaround*: Users who have configured the File Block policy
> and have not configured a special exempt directory as discussed in Microsoft
> Knowledge Base Article 922848 will be unable to open HTML documents in Word
> or Outlook.
>
> How to undo the workaround:
>
> Windows Registry Editor Version 5.00
>
> [HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Word\Security\FileOpenBlock]
>
>
> "HTMLFiles"=dword:00000000
>
> For Office 2007
>
> Windows Registry Editor Version 5.00
>
> [HKEY_CURRENT_USER\Software\Policies\Microsoft\Office\12.0\Word\Security\FileOpenBlock]
>
>
> "HTMLFiles"=dword:00000001
>
> *Note* In order to use 'FileOpenBlock' with Office 2007, all of the latest
> Office 2007 security updates as of May 2007 must be applied.
>
> *Impact of Workaround*: Users who have configured the File Block policy
> and have not configured a special exempt directory as discussed in Microsoft
> Knowledge Base Article 922848 will be unable to open HTML documents in Word
> 2003 or 2007 Microsoft Office System.
>
> How to undo the workaround:
>
> Windows Registry Editor Version 5.00
>
> [HKEY_CURRENT_USER\Software\Policies\Microsoft\Office\12.0\Word\Security\FileOpenBlock]
>
>
> "HTMLFiles"=dword:00000000
>
>  * Do not open or save Microsoft Office files that you receive from
> untrusted sources or that you receive unexpectedly from trusted sources.
> This vulnerability could be exploited when a user opens a specially crafted
> file.
>
> *Additional Information: *
> The information has been provided by *Microsoft Product Security*.
> The original article can be found at:
> http://www.microsoft.com/technet/security/bulletin/ms08-026.mspx
>
> ================================================================================
>
>
>
>
>
>
> This bulletin is sent to members of the SecuriTeam mailing list.
> To unsubscribe from the list, send mail with an empty subject line and
> body to: [EMAIL PROTECTED]
> In order to subscribe to the mailing list and receive advisories in HTML
> format, simply forward this email to: [EMAIL PROTECTED]
>
> ================================================================================
>
> ================================================================================
>
>
> DISCLAIMER:
> The information in this bulletin is provided "AS IS" without warranty of
> any kind.
> In no event shall we be liable for any damages whatsoever including
> direct, indirect, incidental, consequential, loss of business profits or
> special damages.
>
>
>
>
> >
>
>

--~--~---------~--~----~------------~-------~--~----~
 要向邮件组发送邮件,请发到 [email protected]
 要退订此邮件,请发邮件至 [EMAIL PROTECTED]
-~----------~----~----~----~------~----~------~--~---

回复