exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

TPTI-08-04.txt

TPTI-08-04.txt
Posted May 13, 2008
Authored by Aaron Portnoy | Site tippingpoint.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office. Exploitation requires that the target opens an Office file that contains malicious Jet DB Engine objects. The specific flaw exists within the parsing of a column structure. The DWORD value from the structure that specifies the column count is trusted. If this value is changed, an inline memcpy to the stack can overflow while reading a column name. Typically Jet DB structures are used within MDB files which are considered unsafe. However, it is possible to embed such files within a trusted format, such as an Office Document (.doc). This issue allows for remote code execution under the context of the currently logged in user.

tags | advisory, remote, overflow, arbitrary, code execution
advisories | CVE-2007-6026
SHA-256 | e844b4959b56a2734f0ba5e359460c7e58277ade8dc77e054350154dc5dc0174

TPTI-08-04.txt

Change Mirror Download
TPTI-08-04: Microsoft Office Jet Database Engine Column Parsing Stack  
Overflow Vulnerability
http://dvlabs.tippingpoint.com/advisory/TPTI-08-04
May 13, 2008

-- CVE ID:
CVE-2007-6026

-- Affected Vendors:
Microsoft

-- Affected Products:
Microsoft Office Word
Microsoft Office Access

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 6040, 6041.
For further product information on the TippingPoint IPS, visit:

http://www.tippingpoint.com

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Microsoft Office. Exploitation requires that
the target opens an Office file that contains malicious Jet DB Engine
objects.

The specific flaw exists within the parsing of a column structure. The
DWORD value from the structure that specifies the column count is
trusted. If this value is changed, an inline memcpy to the stack can
overflow while reading a column name. Typically Jet DB structures are
used within MDB files which are considered unsafe. However, it is
possible to embed such files within a trusted format, such as an Office
Document (.doc). This issue allows for remote code execution under the
context of the currently logged in user.

-- Vendor Response:
Microsoft has issued an update to correct this vulnerability. More
details can be found at:

http://www.microsoft.com/technet/security/Bulletin/ms08-028.mspx

-- Disclosure Timeline:
2008-04-19 - Vulnerability reported to vendor
2008-05-13 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* Aaron Portnoy, TippingPoint DVLabs
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close