Vigil@nce: Office, OneNote 2007, code execution
September 2008 by Vigil@nce
SYNTHESIS
Two vulnerabilities can be used by an attacker to execute code
when the victim clicks on a OneNote uri.
Gravity: 3/4
Consequences: user access/rights
Provenance: internet server
Means of attack: no proof of concept, no attack
Ability of attacker: expert (4/4)
Confidence: confirmed by the editor (5/5)
Diffusion of the vulnerable configuration: high (3/3)
Number of vulnerabilities in this bulletin: 2
Creation date: 10/09/2008
Identifier: VIGILANCE-VUL-8100
IMPACTED PRODUCTS
– Microsoft Access [confidential versions]
– Microsoft Excel [confidential versions]
– Microsoft Outlook [confidential versions]
– Microsoft PowerPoint [confidential versions]
– Microsoft Publisher [confidential versions]
– Microsoft Visio [confidential versions]
– Microsoft Word [confidential versions]
DESCRIPTION
When the Microsoft Office OneNote product is installed, the user
can click on "onenote://" uris to access to his notes. Two
vulnerabilities can be exploited via OneNote.
An attacker can create a malicious OneNote uri to force the
transfer of a file when the user clicks on this uri. An attacker
can therefore create a file on victim’s computer, or read a file.
By creating a file in the startup directory, the attacker can
execute code. This vulnerability impacts OneNote 2007. [grav:3/4;
ISVA-080910.1]
OneNote uris are handled by the MSO.DLL library. However, one of
its methods does not correctly check the uri size, which generates
a buffer overflow. The vulnerable MSO.DLL library is installed in
all Office versions, even if OneNote is not installed. However,
this vulnerability of MSO.DLL can only be exploited via OneNote.
[grav:3/4]
Both vulnerabilities lead to code execution when the victim clicks
on a OneNote uri.
CHARACTERISTICS
Identifiers: 955047, BID-31067, CVE-2008-3007, ISVA-080910.1,
MS08-055, VIGILANCE-VUL-8100