Secunia Advisory SA35115Microsoft Office PowerPoint Multiple Vulnerabilities
|
||||
Description
Multiple vulnerabilities have been reported in Microsoft Office PowerPoint, which can be exploited by malicious people to compromise a user's system. 1) A boundary error when handling file paths can be exploited to cause a stack-based buffer overflow via a specially crafted file. 2) An error in the parsing of LinkedSlideAtom records can be exploited to cause a heap-based buffer overflow via a specially crafted file. 3) An array indexing error in the parsing of the "placementId" field value in OEPlaceholderAtom records can be exploited to corrupt memory via a specially crafted file. 4) A use-after-free error in the parsing of multiple OEPlaceholderAtom records in a "msofbtClientData" container can be exploited to corrupt memory via a specially crafted file. 5) A boundary error in PowerPoint Viewer 2003 when parsing TextBytesAtom records can be exploited to cause a stack-based buffer overflow via a specially crafted file. 6) A boundary error in PowerPoint Viewer 2003 when parsing TextCharsAtom records can be exploited to cause a stack-based buffer overflow via a specially crafted file. Successful exploitation of the vulnerabilities allows execution of arbitrary code. Solution Provided and/or discovered by Deep Links Discuss this advisoryA new thread in our forum is automatically created for each posted Secunia Advisory. Activate the thread by commenting/discussing below.
|
||||