Vigil@nce: Office, OneNote 2007, code execution
September 2008 by Vigil@nce
SYNTHESIS
Two vulnerabilities can be used by an attacker to execute code when the victim clicks on a OneNote uri.
Gravity: 3/4
Consequences: user access/rights
Provenance: internet server
Means of attack: no proof of concept, no attack
Ability of attacker: expert (4/4)
Confidence: confirmed by the editor (5/5)
Diffusion of the vulnerable configuration: high (3/3)
Number of vulnerabilities in this bulletin: 2
Creation date: 10/09/2008
Identifier: VIGILANCE-VUL-8100
IMPACTED PRODUCTS
Microsoft Access [confidential versions]
Microsoft Excel [confidential versions]
Microsoft Outlook [confidential versions]
Microsoft PowerPoint [confidential versions]
Microsoft Publisher [confidential versions]
Microsoft Visio [confidential versions]
Microsoft Word [confidential versions]
DESCRIPTION
When the Microsoft Office OneNote product is installed, the user can click on "onenote://" uris to access to his notes. Two vulnerabilities can be exploited via OneNote.
An attacker can create a malicious OneNote uri to force the transfer of a file when the user clicks on this uri. An attacker can therefore create a file on victim’s computer, or read a file. By creating a file in the startup directory, the attacker can execute code. This vulnerability impacts OneNote 2007. [grav:3/4; ISVA-080910.1]
OneNote uris are handled by the MSO.DLL library. However, one of its methods does not correctly check the uri size, which generates a buffer overflow. The vulnerable MSO.DLL library is installed in all Office versions, even if OneNote is not installed. However, this vulnerability of MSO.DLL can only be exploited via OneNote. [grav:3/4]
Both vulnerabilities lead to code execution when the victim clicks on a OneNote uri.
CHARACTERISTICS
Identifiers: 955047, BID-31067, CVE-2008-3007, ISVA-080910.1, MS08-055, VIGILANCE-VUL-8100
Tweeter