HTTP: Microsoft Office Project Memory Validation Code Execution

This signature detects attempts to exploit a known memory corruption vulnerability in Microsoft Office Project software. It is due to insufficient validation while allocating memory for a crafted project file. Remote attackers can exploit this by enticing the target user to open a malicious .mpp file in a vulnerable version of Microsoft Office Project. A successful attack can result in arbitrary code execution with the privileges of the logged in user. In an unsuccessful, the application can terminate abnormally due to memory corruption.

Extended Description

Microsoft Project is prone to a remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.

Affected Products

Microsoft project_2000

References

BugTraq: 37211

CVE: CVE-2009-0102

Short Name
HTTP:STC:DL:MPP-MEM-VAL
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2009-0102 Code Execution Memory Microsoft Office Project Validation bid:37211
Release Date
10/14/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Microsoft

CVSS Score

9.3

Found a potential security threat?