HTTP: Microsoft Word RTF Stylesheet Control Word Memory Corruption

This signature detects attempts to exploit a known memory corruption vulnerability in Microsoft Word products. It is due to an index error when processing RTF documents that contain more than six \stylesheet control words. A remote attacker can exploit this by enticing the target user to open a crafted RTF file. A successful attack, can lead to arbitrary code execution within the security context of the currently logged on user. In a successful code injection and execution attack, the behavior of the target depends on the intention of the attacker and is executed within the security context of the currently logged in user. In an unsuccessful code execution attack, the affected product terminates resulting in the loss of any unsaved data from the current session.

Extended Description

Microsoft Word is prone to a remote code-execution vulnerability. An attacker could exploit this issue by enticing a victim to open a malicious RTF file. Successfully exploiting this issue would allow the attacker to execute arbitrary code in the context of the currently logged-in user.

Affected Products

Microsoft word_2003

References

BugTraq: 32594

CVE: CVE-2008-4031

Short Name
HTTP:STC:DL:WORD-STYLESHEET-MEM
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2008-4031 Control Corruption Memory Microsoft RTF Stylesheet Word bid:32594
Release Date
10/20/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3339
False Positive
Unknown
Vendors

Microsoft

CVSS Score

9.3

Found a potential security threat?