Lucene search

K
certCERTVU:511577
HistoryFeb 20, 2007 - 12:00 a.m.

Microsoft Malware Protection Engine fails to properly process a specially crafted PDF File

2007-02-2000:00:00
www.kb.cert.org
13

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.586 Medium

EPSS

Percentile

97.7%

Overview

A vulnerability in the way Microsoft Malware Protection Engine processes PDF files may lead to execution of arbitrary code.

Description

Microsoft Malware Protection Engine contains a vulnerability that could be exploited when it attempts to process specially crafted PDF files. According to Microsoft Security Bulletin MS07-010, an integer overflow vulnerability exists in the way that the Microsoft Malware Protection Engine processes Portable Document Format (PDF) files. An attacker with the ability to supply a specially crafted PDF file could exploit this vulnerability.

Note that according to Microsoft the Malware Protection Engine is a coponent of the following:

* Windows Live OneCare
* Microsoft Antigen for Exchange 9.x
* Microsoft Antigen for SMTP Gateway 9.x
* Microsoft Windows Defender
* Microsoft Windows Defender x64 Edition
* Microsoft Windows Defender in Windows Vista
* Microsoft Forefront Security for Exchange Server
* Microsoft Forefront Security for SharePoint  

Impact

A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial-of-service condition.


Solution

UpdateMicrosoft has released an update to address this issue. See Microsoft Security Bulletin MS07-010 for more details.


Vendor Information

511577

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: February 20, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Refer to Microsoft Security Bulletin MS07-010.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23511577 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported in Microsoft Security Bulletin ms07-10. Microsoft credits Neel Mehta and Alex Wheeler of ISS X-Force for reporting this issue.

This document was written by Chris Taschner.

Other Information

CVE IDs: CVE-2006-5270
Severity Metric: 25.65 Date Public:

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.586 Medium

EPSS

Percentile

97.7%

Related for VU:511577