File Format Vulnerability
|TREND MICRO CUSTOMER PROTECTION||Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 4770. For further product information on the TippingPoint IPS: http://www.tippingpoint.com|
This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Microsoft Office. Exploitation requires that the attacker coerce the target user into opening a malicious .PPT file.
The specific flaw exists during the parsing of a malformed slide notes field within the PowerPoint presentation. When PowerPoint attempts to rebuild the malformed section, a pointer calculation is made based on attacker controlled data from within the file. This pointer is later dereferenced and can lead to arbitrary code execution with the privileges of the user who opened the malicious file.
Microsoft has issued an update to correct this vulnerability. More details can be found at:
|CREDIT||Arnaud Dovi aka 'class101', http://heapoverflow.com