HTTP: Microsoft WordPerfect Length Field Parsing Buffer Overflow

This signature detects attempts to exploit a known vulnerability in Microsoft WordPerfect. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted application.

Extended Description

Microsoft WordPerfect Converter is reported prone to a remote buffer overflow vulnerability when handling malformed files. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable computer to gain unauthorized access. To carry out an attack, the attacker may create a malicious file and entice a user to open the file through an application that employs WordPerfect Converter. Microsoft WordPerfect Converter is installed by default in various versions of Microsoft Office, Microsoft Word, Microsoft FrontPage, Microsoft Publisher, and Microsoft Works Suite. Microsoft Office 2003 Service Pack 1 is not affected by this vulnerability. This issue may be similar in nature to BID 8538 (Microsoft WordPerfect Converter Buffer Overrun Vulnerability).

Affected Products

Microsoft office_xp

References

BugTraq: 11172

CVE: CVE-2004-0573

Short Name
HTTP:MS-WORDPERFECT-BOF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Buffer CVE-2004-0573 Field Length Microsoft Overflow Parsing WordPerfect bid:11172
Release Date
07/08/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Microsoft

CVSS Score

7.5

Found a potential security threat?