CVE-2006-3868
CVSS5.1
发布时间 :2006-10-10 18:07:00
修订时间 :2011-03-07 21:39:37
NMCOS    

[原文]Unspecified vulnerability in Microsoft Office XP and 2003 allows remote user-assisted attackers to execute arbitrary code via a malformed Smart Tag.


[CNNVD]Microsoft Office畸形智能标记远程代码执行漏洞(CNNVD-200610-135)

        Microsoft Office是非常流行的办公软件套件。
        Office在打开特制文件并解析畸形的智能标记时存在漏洞,远程攻击者可能利用此漏洞在用户机器上执行任意指令。如果用户使用管理用户权限登录,成功利用此漏洞的攻击者便可完全控制受影响的系统。

- CVSS (基础分值)

CVSS分值: 5.1 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:office:xpMicrosoft Office XP
cpe:/a:microsoft:office:2003::student_teacher

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:740Microsoft Office Smart Tag Parsing Vulnerability
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3868
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3868
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200610-135
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/807780
(UNKNOWN)  CERT-VN  VU#807780
http://www.microsoft.com/technet/security/Bulletin/MS06-062.mspx
(PATCH)  MS  MS06-062
http://www.vupen.com/english/advisories/2006/3981
(UNKNOWN)  VUPEN  ADV-2006-3981
http://www.securityfocus.com/archive/1/archive/1/449179/100/0/threaded
(UNKNOWN)  HP  SSRT061264
http://www.securityfocus.com/bid/20320
(UNKNOWN)  BID  20320
http://www.securityfocus.com/archive/1/archive/1/449179/100/0/threaded
(UNKNOWN)  HP  SSRT061264
http://www.osvdb.org/29430
(UNKNOWN)  OSVDB  29430
http://securitytracker.com/id?1017034
(UNKNOWN)  SECTRACK  1017034
http://secunia.com/advisories/22339
(UNKNOWN)  SECUNIA  22339

- 漏洞信息

Microsoft Office畸形智能标记远程代码执行漏洞
中危 边界条件错误
2006-10-10 00:00:00 2006-10-16 00:00:00
远程  
        Microsoft Office是非常流行的办公软件套件。
        Office在打开特制文件并解析畸形的智能标记时存在漏洞,远程攻击者可能利用此漏洞在用户机器上执行任意指令。如果用户使用管理用户权限登录,成功利用此漏洞的攻击者便可完全控制受影响的系统。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        临时解决方法:
        * 不要打开或保存从不受信任来源或从受信任来源意外收到的Microsoft Office文件。
        Microsoft已经为此发布了一个安全公告(MS06-062)以及相应补丁:
        MS06-062:Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (922581)
        链接:
        http://www.microsoft.com/technet/security/Bulletin/MS06-062.mspx

- 漏洞信息

29430
Microsoft Office Malformed Smart Tag Arbitrary Code Execution
Local Access Required Input Manipulation
Loss of Integrity Patch / RCS
Exploit Unknown Vendor Verified

- 漏洞描述

A remote overflow exists in Microsoft Office. Office fails to properly handle a boundary error resulting in a buffer overflow. With a specially crafted request, an attacker can execute arbitrary code.

- 时间线

2006-10-10 Unknow
Unknow 2006-10-10

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Microsoft Office Smart Tag Remote Code Execution Vulnerability
Boundary Condition Error 20320
Yes No
2006-10-10 12:00:00 2007-09-20 12:00:00
The original discoverer of this issue is currently unknown.

- 受影响的程序版本

Microsoft Visio 2002 SP2
Microsoft Visio 2002 SP1
Microsoft Project 2002 SP2
Microsoft Project 2002 SP1
Microsoft Project 2002 0
Microsoft Office XP SP3
+ Microsoft Excel 2002 SP3
+ Microsoft Excel 2002 SP3
+ Microsoft FrontPage 2002 SP3
+ Microsoft FrontPage 2002 SP3
+ Microsoft Outlook 2002 SP3
+ Microsoft Outlook 2002 SP3
+ Microsoft PowerPoint 2002 SP3
+ Microsoft PowerPoint 2002 SP3
+ Microsoft Publisher 2002 SP3
+ Microsoft Publisher 2002 SP3
Microsoft Office XP SP2
- Microsoft Windows 2000 Professional SP3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 98
- Microsoft Windows 98SE
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home SP1
- Microsoft Windows XP Home
- Microsoft Windows XP Professional SP1
- Microsoft Windows XP Professional
Microsoft Office XP SP1
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
- Microsoft Windows XP Professional
Microsoft Office 2003 SP2
Microsoft Office 2003 SP1

- 漏洞讨论

Microsoft Office is prone to a remote code-execution vulnerability. This issue occurs when Office attempts to process malformed files.

An attacker could exploit this issue by enticing a victim to load a malicious Office file. If the vulnerability is successfully exploited, this could result in the execution of arbitrary code in the context of the currently logged-in user.

- 漏洞利用

Exploit code targeting this issue is reported to be circulating in the wild. The exploit obfuscates itself by using the ActiveX control CLSID:{0002E510-0000-0000-C000-000000000046} to imbed a malicious Office document in an HTML/JavaScript page.

- 解决方案

Microsoft has released a security advisory addressing this issue.


Microsoft Office XP SP3

Microsoft Office 2003 SP2

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站