Check Point Reference: | CPAI-2008-257 |
Date Published: | 18 Feb 2010 |
Severity: | High |
Last Updated: | Sunday 14 February, 2016 |
Source: | |
Industry Reference: | CVE-2008-0105 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Microsoft Works is a home/office productivity software suite. Its core functionality includes a word processor, a spreadsheet, and a database. A Microsoft Works Document, normally denoted by the extension .wps, has numerous properties which define the appearance of the document, as well as some more advanced properties for document objects, such as URLs, embedded images, and so on. There exists a buffer overflow vulnerability in Microsoft Works File Converter. The vulnerability is due to insufficient input validation of section header index table while handling WPS files. A remote attacker can exploit this vulnerability by enticing the target user to open maliciously constructed files, potentially causing arbitrary code to be injected and executed in the security context of the logged-in user. In case of an attack where code injection and execution is successful, the behavior of the target would depend on the intended purpose of the injected code. Any code injected would run in the security context of the current logged on user. In case of an attack where code injection is not successful, the affected product could terminate abnormally. This can potentially lead to a loss of data. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Content Protection Violation.
Attack Information: Microsoft Works File Converter WPS file section header index table stack overflow (MS08-011)