Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:188
HistoryMay 13, 2000 - 12:00 a.m.

Security Bulletin (MS00-034)

2000-05-1300:00:00
vulners.com
15

Microsoft Security Bulletin (MS00-034)


Patch Available for "Office 2000 UA Control" Vulnerability

Originally Posted: May 12, 2000

Summary

Microsoft has released a patch that eliminates a security
vulnerability in Microsoft(r) Office 2000 and Office 2000 family
members. The vulnerability could allow a malicious web site operator
to take inappropriate action on the computer of a user who visited his
web site.

Frequently asked questions regarding this vulnerability
and the patch can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-034.asp

Issue

An ActiveX control that ships as part of Office 2000 is incorrectly
marked as "safe for scripting". This control, the Office 2000 UA
Control, is used by the "Show Me" function in Office Help, and allows
Office functions to be scripted. A malicious web site operator could
use the control to carry out Office functions on the machine of a user
who visited his site.

The control ships only as part of Office 2000 (and Office 2000 family
members, as listed below). The patch removes all unsafe functionality,
with the result that the "Show Me" function will be disabled in Office
2000.

Affected Software Versions

  • Office 2000

Note: The products in the Office suite also are available for purchase
separately. The control ships as part of the following such products:
- Word 2000
- Excel 2000
- Powerpoint 2000
- Access 2000
- Photodraw 2000
- FrontPage 2000
- Project 2000
- Publisher 2000
- Outlook 2000
- Works 2000 Suite

Patch Availability

NOTE: Additional security patches are available at the Microsoft
Download Center

More Information

Please see the following references for more information related to
this issue.

Obtaining Support on this Issue

This is a fully supported patch. Information on contacting Microsoft
Technical Support is available at
http://support.microsoft.com/support/contact/default.asp.

Acknowledgments

Microsoft thanks Dildog of the @Stake, Inc. L0pht Research Labs for
reporting this vulnerability to us and working with us to protect
customers.

Revisions

  • May 12, 2000: Bulletin Created.

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES
WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS
OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR
CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY
NOT APPLY.

Last updated May 12, 2000

(c) 2000 Microsoft Corporation. All rights reserved. Terms of use.