MS10-087: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930)

This script is Copyright (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

Arbitrary code can be executed on the remote host through Microsoft
Office.

Description :

The remote Windows host is running a version of Microsoft Office that
is affected by several vulnerabilities :

- An integer underflow exists in the way the application
parses the PowerPoint file format, which could lead to
heap corruption and allow for arbitrary code execution
when opening a specially crafted PowerPoint file.
(CVE-2010-2573)

- A stack-based buffer overflow can be triggered when
parsing specially crafted RTF files, leading to
arbitrary code execution. (CVE-2010-3333)

- A memory corruption vulnerability exists in the way
the application parses specially crafted Office files
containing Office Art Drawing records. (CVE-2010-3334)

- A memory corruption vulnerability exists in the way
drawing exceptions are handled when opening specially
crafted Office files. (CVE-2010-3335)

- A memory corruption vulnerability exists in the way
the application parses specially crafted Office files.
(CVE-2010-3336)

- A DLL preloading (aka binary planting) vulnerability
exists because the application insecurely looks in
its current working directory when resolving DLL
dependencies. (CVE-2010-3337)

See also :

http://technet.microsoft.com/en-us/security/bulletin/MS10-087

Solution :

Microsoft has released a set of patches for Office XP, 2003, 2007, and
2010.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 50528 ()

Bugtraq ID: 42628
44628
44652
44656
44659
44660

CVE ID: CVE-2010-2573
CVE-2010-3333
CVE-2010-3334
CVE-2010-3335
CVE-2010-3336
CVE-2010-3337