Информационная безопасность
[RU] switch to English


Повреждение памяти в Microsoft MFC (memory corruption)
дополнено с 13 февраля 2007 г.
Опубликовано:16 марта 2007 г.
Источник:
SecurityVulns ID:7230
Тип:клиент
Уровень опасности:
7/10
Описание:Повреждение памяти при разборе файлов RTF. Может быть использовано для скрытой установки вредоносного кода.
Затронутые продукты:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
CVE:CVE-2007-1512 (Stack-based buffer overflow in the AfxOleSetEditMenu function in the MFC component in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 Gold and SP1, and Visual Studio .NET 2002 Gold and SP1, and 2003 Gold and SP1 allows user-assisted remote attackers to have an unknown impact (probably crash) via an RTF file with a malformed OLE object, which results in writing two 0x00 characters past the end of szBuffer, aka the "MFC42u.dll Off-by-Two Overflow." NOTE: this issue is due to an incomplete patch (MS07-012) for CVE-2007-0025.)
 CVE-2007-0025 (The MFC component in Microsoft Windows 2000 SP4, XP SP2, and 2003 SP1 and Visual Studio .NET 2000, 2002 SP1, 2003, and 2003 SP1 allows user-assisted remote attackers to execute arbitrary code via an RTF file with a malformed OLE object that triggers memory corruption. NOTE: this might be due to a stack-based buffer overflow in the the AfxOleSetEditMenu function in MFC42u.dll.)
Оригинальный текстdocumentgssincla_(at)_nnlsoftware.com, MS07-012 Not Fixed (16.03.2007)
 documentMICROSOFT, Microsoft Security Bulletin MS07-012 Vulnerability in Microsoft MFC Could Allow Remote Code Execution (924667) (13.02.2007)
Файлы:Microsoft Security Bulletin MS07-012 Vulnerability in Microsoft MFC Could Allow Remote Code Execution (924667)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород