SB2009041401 - Multiple vulnerabilities in Microsoft Windows
Published: April 14, 2009 Updated: December 13, 2016
Security Bulletin ID
SB2009041401
Severity
Critical
Patch available
YES
Number of vulnerabilities
3
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2009-0235)
The vulnerability alows a remote authenticated attacker to execute arbitrary code on the target system.The weakness exists due to buffer overflow when parsing a malformed Word 97 document in Microsoft WordPad. A remote attacker can create a specially crafted Word file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
2) Stack-based buffer overflow (CVE-ID: CVE-2009-0088)
The vulnerability alows a remote attacker to execute arbitrary code on the target system.The weakness exists due to stack overflow when parsing a malformed WordPerfect document. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
3) Memory corruption (CVE-ID: CVE-2009-0087)
The vulnerability alows a remote attacker to execute arbitrary code on the target system.The weakness exists due to buffer overflow when process documents in Microsoft WordPad and Microsoft Office converter. A remote attacker can create a specially crafted Word file containing a malformed data, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Note: the vulnerability was being actively exploited.
Remediation
Install update from vendor's website.