Lucene search

K
saintSAINT CorporationSAINT:1958D6CA16E64B9B1907ED06C1138DB1
HistoryFeb 12, 2010 - 12:00 a.m.

Microsoft PowerPoint OEPlaceholderAtom placementId memory corruption

2010-02-1200:00:00
SAINT Corporation
my.saintcorporation.com
15

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.886 High

EPSS

Percentile

98.6%

Added: 02/12/2010
CVE: CVE-2010-0031
BID: 38103
OSVDB: 62237

Background

Microsoft PowerPoint is presentation software included in the Microsoft Office desktop suite.

Problem

A memory corruption vulnerability allows command execution when a user opens a PowerPoint file containing an OEPlaceholderAtom record with a specially crafted placementId parameter.

Resolution

Apply the update referenced in Microsoft Security Bulletin 10-004.

References

<http://www.microsoft.com/technet/security/bulletin/MS10-004.mspx&gt;

Limitations

Exploit works on Microsoft PowerPoint 2003 SP3 and requires a user to open the exploit file in Microsoft PowerPoint.

The exploit is not executed until the exploit file is closed.

This exploit requires the IO::Uncompress::Gunzip and Compress::Zlib PERL modules from CPAN.

Platforms

Windows

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.886 High

EPSS

Percentile

98.6%