Alert: Microsoft Security Bulletin MS05-035 - Vulnerability in Microsoft Word Could Allow Remote Code Execution (903672)

From: Cooper, Russ (russ.cooper_at_CYBERTRUST.COM)
Date: 07/12/05

  • Next message: Cooper, Russ: "Alert: Microsoft Security Bulletin MS05-036 - Vulnerability in Microsoft Color Management Module Could Allow Remote Code Execution (901214)"
    Date:         Tue, 12 Jul 2005 13:46:49 -0400
    To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
    
    

    Microsoft Security Bulletin MS05-035:
    Vulnerability in Microsoft Word Could Allow Remote Code Execution
    (903672)

    Bulletin URL:
    <http://www.microsoft.com/technet/security/Bulletin/MS05-035.mspx>

    Version Number: 1.0
    Issued Date: Tuesday, July 12, 2005
    Impact of Vulnerability: Remote Code Execution Maximum Severity Rating:
    Critical
    Patch(es) Replaced: This bulletin replaces the MS05-023 security update.
    Caveats: None

    Tested Software:
    Affected Software:
    ------------------
    * Microsoft Office 2000 Software Service Pack 3 - Word 2000
    <http://tinyurl.com/9hjvw>
    * Microsoft Office XP Software Service Pack 3 - Word 2002 Microsoft
    Works Suites:
    - Microsoft Works Suite 2000 - Download the update (KB895333) (same as
    Microsoft Office 2000 link)
    - Microsoft Works Suite 2001 - Download the update (KB895333) (same as
    Microsoft Office 2000 link)
    - Microsoft Works Suite 2002 - Download the update (KB895589) (same as
    the Microsoft Office XP link)
    - Microsoft Works Suite 2003 - Download the update (KB895589) (same as
    the Microsoft Office XP link)
    - Microsoft Works Suite 2004 - Download the update (KB895589) (same as
    the Microsoft Office XP link) Word 2000 <http://tinyurl.com/d2ag3>

    Technical Description:
    ----------------------
    * Font Parsing Vulnerability in Word - CAN-2005-0564: A remote code
    execution vulnerability exists in Word that could allow an attacker who
    successfully exploited this vulnerable to take complete control of the
    affected system.

    This email is sent to NTBugtraq automagically as a service to my
    subscribers. (v4.01.1975.38886)

    Cheers,
    Russ Cooper - Cybertrust/NTBugtraq Editor

    --
    NTBugtraq Editor's Note:
    Most viruses these days use spoofed email addresses. As such, using an Anti-Virus product which automatically notifies the perceived sender of a message it believes is infected may well cause more harm than good. Someone who did not actually send you a virus may receive the notification and scramble their support staff to find an infection which never existed in the first place. Suggest such notifications be disabled by whomever is responsible for your AV, or at least that the idea is considered.
    --
    

  • Next message: Cooper, Russ: "Alert: Microsoft Security Bulletin MS05-036 - Vulnerability in Microsoft Color Management Module Could Allow Remote Code Execution (901214)"

    Relevant Pages