what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

rtf.htm

rtf.htm
Posted Jan 26, 2000
Site oliver.efri.hr

RTF files consist of text and control information. The control information is specified via directives called control words. The default RTF reader that ships as part of many Windows platforms has an unchecked buffer in the portion of the reader that parses control words. If an RTF file contains a specially-malformed control word, it could cause the application to crash.

tags | exploit
systems | windows
SHA-256 | 27ba30c0f7c1e053fdc20342b41f7fbf0815631ae08c4738c0819002d49a196f

rtf.htm

Change Mirror Download
<!DOCTYPE HTML PUBLIC "html.dtd">
<HTML>
<BODY BGCOLOR="#000000" TEXT="#FFFFFF"><PRE>
<FONT COLOR="#CC0000">COMMAND</FONT>

RTF Control

<FONT COLOR="#CC0000">SYSTEMS AFFECTED</FONT>

- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows 98 Second Edition
- Microsoft Windows NT 4.0 Workstation
- Microsoft Windows NT 4.0 Server
- Microsoft Windows NT 4.0 Server, Enterprise Edition
- Microsoft Windows NT 4.0 Server, Terminal Server Edition

<FONT COLOR="#CC0000">PROBLEM</FONT>

Following is based on Security Bulletin from the Microsoft. RTF
files consist of text and control information. The control
information is specified via directives called control words. The
default RTF reader that ships as part of many Windows platforms
has an unchecked buffer in the portion of the reader that parses
control words. If an RTF file contains a specially-malformed
control word, it could cause the application to crash.

Microsoft believes that this is a denial of service vulnerability
only, and that there is no capability to use this vulnerability
to run arbitrary code. The most serious risk from this
vulnerability would result if a user had preview mode enabled on
a mail program like Outlook, and received an email that exploited
the vulnerability. Because preview mode causes the mail to be
parsed without user assent, the mail program would continue to
crash until a subsequent mail was received or the mail program
was started with preview mode disabled.

<FONT COLOR="#CC0000">SOLUTION</FONT>

Windows 2000 is not affected by this vulnerability. Patch
availability:
<FONT COLOR="#00FF00">
- Windows 95:
http://www.microsoft.com/windows95/downloads/contents/WUCritical/rtfcontrol/default.asp
- Window 98:
http://www.microsoft.com/windows98/downloads/contents/WUCritical/rtfcontrol/default.asp
- Windows NT 4.0 Workstation, Windows NT 4.0 Server, and Windows NT 4.0 Server, Enterprise Edition:
Intel: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=17510
Alpha: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=17511
- Windows NT 4.0 Server, Terminal Server Edition:
To be released shortly.
</FONT>
The Windows 95 and 98 versions of the patch will also be available
via WindowsUpdate shortly. When this happens, we will modify the
bulletin to note this fact.
</FONT>
</PRE></BODY>
</HTML>
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close