Computer Security
[EN] securityvulns.ru no-pyccku


Microsoft MFC memory corruption
updated since 13.02.2007
Published:16.03.2007
Source:
SecurityVulns ID:7230
Type:client
Threat Level:
7/10
Description:Memory corruption on RTF files parsing. Can be used for hidden malware installation.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
CVE:CVE-2007-1512 (Stack-based buffer overflow in the AfxOleSetEditMenu function in the MFC component in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 Gold and SP1, and Visual Studio .NET 2002 Gold and SP1, and 2003 Gold and SP1 allows user-assisted remote attackers to have an unknown impact (probably crash) via an RTF file with a malformed OLE object, which results in writing two 0x00 characters past the end of szBuffer, aka the "MFC42u.dll Off-by-Two Overflow." NOTE: this issue is due to an incomplete patch (MS07-012) for CVE-2007-0025.)
 CVE-2007-0025 (The MFC component in Microsoft Windows 2000 SP4, XP SP2, and 2003 SP1 and Visual Studio .NET 2000, 2002 SP1, 2003, and 2003 SP1 allows user-assisted remote attackers to execute arbitrary code via an RTF file with a malformed OLE object that triggers memory corruption. NOTE: this might be due to a stack-based buffer overflow in the the AfxOleSetEditMenu function in MFC42u.dll.)
Original documentdocumentgssincla_(at)_nnlsoftware.com, MS07-012 Not Fixed (16.03.2007)
 documentMICROSOFT, Microsoft Security Bulletin MS07-012 Vulnerability in Microsoft MFC Could Allow Remote Code Execution (924667) (13.02.2007)
Files:Microsoft Security Bulletin MS07-012 Vulnerability in Microsoft MFC Could Allow Remote Code Execution (924667)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod