{"vuid":"VU#497756","idnumber":"497756","name":"Microsoft Windows fails to properly handle malformed OLE objects embedded in RTF documents","keywords":["Microsoft","Windows","OLE Dialog component","remote code execution","RTF file","ms07-feb"],"overview":"A vulnerability in the way that Microsoft Windows handles OLE objects embedded within RTF documents may allow an attacker to execute arbitrary code.","clean_desc":"Microsoft Object Linking and Embedding (OLE) is a technology that allows applications to create and edit compound documents. Compound documents are those consisting of one format, that contain embeddings of (or links to) documents of another format. Microsoft Windows fails to properly handle a malformed OLE object embedded in a Rich Text Format (RTF) document. An attacker may be able to exploit this vulnerability by convincing a user to open a specially crafted RTF document that includes an embedded malformed OLE object. Note that on Windows, Wordpad.exe is the default handler for RTF documents.","impact":"A remote unauthenticated attacker may be able to execute arbitrary code.","resolution":"Apply an Update\nMicrosoft has addressed this vulnerability in Microsoft Security Bulletin MS07-011.","workarounds":"Do not open untrusted RTF documents Do not open unfamiliar or unexpected RTF (.rtf) documents, particularly those hosted on web sites or delivered as email attachments. Please see Cyber Security Tip ST04-010. Block Embedded Object in Wordpad For instructions on how to Enable Embedded Object blocking in Wordpad, refer to the workarounds section of Microsoft Security Bulletin MS07-011. Uninstall WordPad According to Microsoft Security Bulletin MS07-011 uninstalling WordPad will block the parsing of embedded objects within Rich Text Files.","sysaffected":"","thanks":"This vulnerability was reported in Microsoft Security Bulletin \nMS07-011\n. Microsoft credits \nKostya Kortchinsky of Immunity, Inc. and Fabrice Desclaux from EADS Common Research Center with reporting this issue.","author":"This document was written by Jeff Gennari based on information from Microsoft.","public":["http://www.microsoft.com/technet/security/bulletin/ms07-011.mspx","http://secunia.com/advisories/24147/","http://securitytracker.com/alerts/2007/Feb/1017637.html","http://www.securityfocus.com/bid/22483"],"cveids":["CVE-2007-0026"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-02-13T18:50:13Z","publicdate":"2007-02-13T00:00:00Z","datefirstpublished":"2007-02-14T17:35:38Z","dateupdated":"2007-02-23T13:59:22Z","revision":10,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"8","cam_exploitation":"0","cam_internetinfrastructure":"8","cam_population":"20","cam_impact":"20","cam_easeofexploitation":"7","cam_attackeraccessrequired":"10","cam_scorecurrent":"8.4","cam_scorecurrentwidelyknown":"14.7","cam_scorecurrentwidelyknownexploited":"25.2","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.4,"vulnote":null}