---------------------------------------------------------------------- Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/ ---------------------------------------------------------------------- TITLE: Microsoft Office PowerPoint Multiple Vulnerabilities SECUNIA ADVISORY ID: SA35115 VERIFY ADVISORY: http://secunia.com/advisories/35115/ DESCRIPTION: Multiple vulnerabilities have been reported in Microsoft Office PowerPoint, which can be exploited by malicious people to compromise a user's system. 1) A boundary error when handling file paths can be exploited to cause a stack-based buffer overflow via a specially crafted file. 2) An error in the parsing of LinkedSlideAtom records can be exploited to cause a heap-based buffer overflow via a specially crafted file. 3) An array indexing error in the parsing of the "placementId" field value in OEPlaceholderAtom records can be exploited to corrupt memory via a specially crafted file. 4) A use-after-free error in the parsing of OEPlaceholderAtom records can be exploited to corrupt memory via a specially crafted file. 5) A boundary error in PowerPoint Viewer 2003 when parsing TextBytesAtom records can be exploited to cause a stack-based buffer overflow via a specially crafted file. 6) A boundary error in PowerPoint Viewer 2003 when parsing TextCharsAtom records can be exploited to cause a stack-based buffer overflow via a specially crafted file. Successful exploitation of the vulnerabilities allows execution of arbitrary code. SOLUTION: Apply patches. Microsoft Office PowerPoint 2002 SP3: http://www.microsoft.com/downloads/details.aspx?familyid=cfc697b4-2ceb-4030-86c5-be9bc8bfd07c Microsoft Office PowerPoint 2003 SP3: http://www.microsoft.com/downloads/details.aspx?familyid=2291ae24-fa39-4ad8-a7d0-12726b68ad96 NOTE: Patches are not being released for standalone installations of PowerPoint Viewer 2003 as the product is past its support life cycle. PROVIDED AND/OR DISCOVERED BY: 1) Carsten Eiram, Secunia Research. 2, 3, 4) The vendor credits Sean Larsson, VeriSign iDefense Labs. 5) SkD, reported via ZDI. 6) Cody Pierce, TippingPoint DVLabs. CHANGELOG: 2010-02-10: Added additional information provided by TippingPoint DVLabs and ZDI. ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2009-28/ MS10-004 (KB975416, KB973143, KB976881): http://www.microsoft.com/technet/security/Bulletin/MS10-004.mspx TippingPoint DVLabs: http://dvlabs.tippingpoint.com/advisory/TPTI-10-02 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------