Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2006-1540 | First vendor Publication | 2006-03-30 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
MSO.DLL in Microsoft Office 2000, Office XP (2002), and Office 2003 allows user-assisted attackers to cause a denial of service and execute arbitrary code via multiple attack vectors, as originally demonstrated using a crafted document record with a malformed string, as demonstrated by replacing a certain "01 00 00 00" byte sequence with an "FF FF FF FF" byte sequence, possibly causing an invalid array index, in (1) an Excel .xls document, which triggers an access violation in ole32.dll; (2) an Excel .xlw document, which triggers an access violation in excel.exe; (3) a Word document, which triggers an access violation in mso.dll in winword.exe; and (4) a PowerPoint document, which triggers an access violation in powerpnt.txt. NOTE: after the initial disclosure, this issue was demonstrated by triggering an integer overflow using an inconsistent size for a Unicode "Sheet Name" string. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1540 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:639 | |||
Oval ID: | oval:org.mitre.oval:def:639 | ||
Title: | Microsoft Office Malformed String Parsing Vulnerability | ||
Description: | MSO.DLL in Microsoft Office 2000, Office XP (2002), and Office 2003 allows user-assisted attackers to cause a denial of service and execute arbitrary code via multiple attack vectors, as originally demonstrated using a crafted document record with a malformed string, as demonstrated by replacing a certain "01 00 00 00" byte sequence with an "FF FF FF FF" byte sequence, possibly causing an invalid array index, in (1) an Excel .xls document, which triggers an access violation in ole32.dll; (2) an Excel .xlw document, which triggers an access violation in excel.exe; (3) a Word document, which triggers an access violation in mso.dll in winword.exe; and (4) a PowerPoint document, which triggers an access violation in powerpnt.txt. NOTE: after the initial disclosure, this issue was demonstrated by triggering an integer overflow using an inconsistent size for a Unicode "Sheet Name" string. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-1540 | Version: | 5 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Microsoft Office |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
27150 | Microsoft Office MSO.DLL String Processing Overflow A local overflow exists in Office, Project, Visio and Office for Mac. MSO.DLL fails to validate Office documents resulting in a buffer overflow. With a specially crafted file containing a malformed string, an attacker can cause arbitrary code execution resulting in a loss of integrity. |
24595 | Microsoft Office Malformed BIFF Record Multiple File Format Processing DoS |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Office Word information string overflow attempt RuleID : 7203 - Revision : 18 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word document summary information string overflow attempt RuleID : 7202 - Revision : 16 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word summary information null string overflow attempt RuleID : 7201 - Revision : 11 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word document summary information null string overflow attempt RuleID : 7200 - Revision : 11 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Excel MSO.DLL malformed string parsing multi byte buffer ove... RuleID : 7198 - Revision : 10 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Excel MSO.DLL malformed string parsing single byte buffer ov... RuleID : 7197 - Revision : 17 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word document summary information string overflow attempt RuleID : 20141 - Revision : 14 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word document summary information string overflow attempt RuleID : 20140 - Revision : 14 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Word document summary information string overflow attempt RuleID : 20139 - Revision : 15 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-07-11 | Name : An application installed on the remote Mac OS X host is affected by multiple ... File : macosx_ms_06-037.nasl - Type : ACT_GATHER_INFO |
2006-07-11 | Name : Arbitrary code can be executed on the remote host through Microsoft Office. File : smb_nt_ms06-038.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:20:49 |
|
2024-11-28 12:08:37 |
|
2021-05-04 12:03:52 |
|
2021-04-22 01:04:25 |
|
2020-05-23 00:17:36 |
|
2018-10-18 21:20:03 |
|
2018-10-13 00:22:33 |
|
2017-11-21 21:22:42 |
|
2017-10-11 09:23:39 |
|
2017-07-20 09:23:28 |
|
2016-12-06 12:01:03 |
|
2016-06-28 15:42:19 |
|
2016-04-26 14:27:38 |
|
2014-02-17 10:35:18 |
|
2014-01-19 21:23:13 |
|
2013-05-11 10:52:57 |
|