Secunia Advisory SA39663Visual Basic for Applications Single-Byte Stack Overwrite Vulnerability
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
A vulnerability has been reported in Microsoft Visual Basic for Applications (VBA), which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to an error in VBE6.dll within some text parsing code when searching for ActiveX controls in documents supporting VBA (e.g. an Office document). This can be exploited to convert a single byte with the value 0x2E outside the bounds of a buffer to 0x00 via a specially crafted document with embedded ActiveX controls passed to the VBA runtime. Solution Provided and/or discovered by Other references Alternate/detailed remediation Deep Links Do you have additional information related to this advisory?Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Debian update for phpgroupware |