Microsoft Office contains a buffer overflow when handling specially crafted document properties. This vulnerability could allow a remote attacker to execute arbitrary code.
Microsoft Office applications fail to properly validate property fields resulting in a buffer overflow. When an Office document containing malformed a property field is opened with an Office application, system memory can be corrupted in a way that may allow an attacker to execute arbitrary code. Property fields include, but are not limited to document title, subject, and author.
More information, including a list of affected Office applications, is available in Microsoft Security Bulletin MS06-038.
A remote, unauthenticated attacker may be able to execute arbitrary code.
Apply a patch from Microsoft
Microsoft addresses this vulnerability with the updates listed in Microsoft Security Bulletin MS06-038.
Do not access Office documents from untrusted sources
By only accessing Office documents, such as spreadsheets or Microsoft Word documents, from trusted or known sources, the chances of exploitation are reduced.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Vendor has issued information
__ Sort by: Status Alphabetical
Affected Unknown __ Unaffected
Updated: July 11, 2006
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Refer to <http://www.microsoft.com/technet/security/Bulletin/MS06-038.mspx>.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | | N/A
This vulnerability was reported in Microsoft Security Bulletin MS06-038
This document was written by Jeff Gennari.
CVE IDs: | CVE-2006-2389
Severity Metric:** | 22.44
Date Public: | 2006-07-11
Date First Published: | 2006-07-11
Date Last Updated: | 2006-07-11 20:52 UTC
Document Revision: | 34