Культурный офтопик
 help / color / mirror / Atom feed
* [room] Fwd: [SA20153] Microsoft Word Unspecified Code Execution Vulnerability
@ 2006-05-20  7:45 Michael Shigorin
  2006-05-21 19:40 ` hozzzar
  0 siblings, 1 reply; 5+ messages in thread
From: Michael Shigorin @ 2006-05-20  7:45 UTC (permalink / raw)
  To: smoke-room

вот так...

----- Forwarded message from Secunia Security Advisories -----


TITLE:
Microsoft Word Unspecified Code Execution Vulnerability

SECUNIA ADVISORY ID:
SA20153

VERIFY ADVISORY:
http://secunia.com/advisories/20153/

CRITICAL:
Extremely critical

IMPACT:
System access

WHERE:
>From remote

SOFTWARE:
Microsoft Office 2003 Professional Edition
http://secunia.com/product/2276/
Microsoft Office 2003 Small Business Edition
http://secunia.com/product/2277/
Microsoft Office 2003 Standard Edition
http://secunia.com/product/2275/
Microsoft Office 2003 Student and Teacher Edition
http://secunia.com/product/2278/
Microsoft Office XP
http://secunia.com/product/23/
Microsoft Word 2002
http://secunia.com/product/2150/
Microsoft Word 2003
http://secunia.com/product/4908/

DESCRIPTION:
A vulnerability has been reported in Microsoft Word, which can be
exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an unspecified error. This can be
exploited to execute arbitrary code.

NOTE: This vulnerability is being actively exploited.

The vulnerability has been reported in Microsoft Word 2002 and
Microsoft Word 2003.

SOLUTION:
Do not open untrusted Office documents.

PROVIDED AND/OR DISCOVERED BY:
This vulnerability has been discovered in the wild as a "Zero-day"
while investigating a system compromise.

OTHER REFERENCES:
SANS:
http://isc.sans.org/diary.php?storyid=1345

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

----- End forwarded message -----

-- 
 ---- WBR, Michael Shigorin <mike@altlinux.ru>
  ------ Linux.Kiev http://www.linux.kiev.ua/


^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2006-05-22  1:59 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2006-05-20  7:45 [room] Fwd: [SA20153] Microsoft Word Unspecified Code Execution Vulnerability Michael Shigorin
2006-05-21 19:40 ` hozzzar
2006-05-21 20:09   ` Damir Shayhutdinov
2006-05-21 20:24     ` hozzzar
2006-05-22  1:59     ` Pavel N. Solovyov

Культурный офтопик

This inbox may be cloned and mirrored by anyone:

	git clone --mirror http://lore.altlinux.org/smoke-room/0 smoke-room/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 smoke-room smoke-room/ http://lore.altlinux.org/smoke-room \
		smoke-room@lists.altlinux.org smoke-room@lists.altlinux.ru smoke-room@lists.altlinux.com smoke-room@altlinux.ru smoke-room@altlinux.org smoke-room@altlinux.com
	public-inbox-index smoke-room

Example config snippet for mirrors.
Newsgroup available over NNTP:
	nntp://lore.altlinux.org/org.altlinux.lists.smoke-room


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git