Lucene search

K
certCERTVU:926676
HistoryDec 11, 2008 - 12:00 a.m.

Microsoft WordPad Text Converter vulnerable to remote code execution

2008-12-1100:00:00
www.kb.cert.org
9

0.879 High

EPSS

Percentile

98.7%

Overview

The WordPad Text Converter for Word 97 files included in some versions of Windows contains an unspecified error which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.

Description

Microsoft WordPad is a text editor included by default with the Windows operating system. It includes WordPad Text Converters that allow users who do not have Microsoft Word installed to open documents in older file formats, including Microsoft Office Word 97.

An unspecified error in the way that the WordPad Text Converter for Word 97 handles files in this format results in memory corruption that could allow an attacker to execute arbitrary code. Microsoft Office Word 97 files may have file extensions such as .doc, .wri, or .rtf. While Microsoft Office Word has the ability to open Office Word 97 files, it is not affected by this vulnerability. However, in the default configuration, Windows will open files having the .wri extension with WordPad. Therefore, it is likely that systems that have Microsoft Office Word installed will still open a malicious Microsoft Office Word 97 document with this extension using the affected WordPad.

Microsoft notes that Windows XP Service Pack 3, Windows Vista and Windows Vista Service Pack 1 (including x64 editions), and Windows Server 2008 are not affected by this vulnerability.

This vulnerability is currently being exploited in the wild.


Impact

By convincing a user to view a specially crafted Word 97 document (e.g., an attachment supplied in email), a remote attacker may be able to execute arbitrary commands with the privileges of the user.


Solution

We are currently unaware of a practical solution to this problem.


Disable****the WordPad Text Converter for Word 97 file format

Microsoft has included instructions for disabling the affected component in Microsoft Security Advisory (960906).


Vendor Information

926676

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: December 11, 2008

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

Microsoft has published Microsoft Security Advisory (960906) in response to this issue. Users are encouraged to review this advisory and apply the workarounds it prescribes.

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

<http://www.microsoft.com/technet/security/advisory/960906.mspx&gt;

Acknowledgements

This document was written by Chad R Dougherty.

Other Information

CVE IDs: CVE-2008-4841
Severity Metric: 6.89 Date Public: