{"vuid":"VU#853184","idnumber":"853184","name":"Microsoft Office drawing object vulnerability","keywords":["Microsoft","remote code execution","crafted drawing object","ms07-may"],"overview":"Microsoft Office fails to properly handle malformed drawing objects. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code.","clean_desc":"Microsoft Office fails to properly handle malformed drawing objects embedded within Office documents. By convincing a user to open a specially crafted Office document, an attacker may be able to corrupt memory in a way that could allow them to execute arbitrary code. More information on this vulnerability is available in Microsoft Security Bulletin MS07-025.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the user running the Office application. If the user is logged in with administrative privileges, the attacker could take complete control of a vulnerable system","resolution":"Apply an update This vulnerability is addressed by the updates included with Microsoft Security Bulletin MS07-025.","workarounds":"Do not open untrusted Office documents Do not open unfamiliar or unexpected Office documents, particularly those hosted on web sites or delivered as email attachments. Please see Cyber Security Tip ST04-010. Do not rely on file name extension filtering In most cases, Windows will call the appropriate Office application to open a document even if the document has an unknown file extension. For example, if document.qwer contains the correct file header information for Word, Windows will open document.qwer with Word. Filtering for common extensions (e.g., .doc, and .dot) will not detect all Office documents. Disable automatic opening of Microsoft Office documents By default, Microsoft Office 97 and Microsoft Office 2000 will configure Internet Explorer to automatically open Microsoft Office documents. This feature can be disabled by using the Office Document Open Confirmation Tool. Mozilla Firefox users should disable automatic opening of files, as specified in the Securing Your Web Browser document.","sysaffected":"","thanks":"This vulnerability was reported in Microsoft Security Bulletin \nMS07-025","author":"This document was written by Jeff Gennari.","public":["h","t","t","p",":","/","/","w","w","w",".","m","i","c","r","o","s","o","f","t",".","c","o","m","/","t","e","c","h","n","e","t","/","s","e","c","u","r","i","t","y","/","b","u","l","l","e","t","i","n","/","m","s","0","7","-","0","2","5",".","m","s","p","x"],"cveids":["CVE-2007-1747"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-05-07T13:15:20Z","publicdate":"2007-05-08T00:00:00Z","datefirstpublished":"2007-05-08T18:32:29Z","dateupdated":"2007-05-08T18:45:34Z","revision":15,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"8","cam_exploitation":"0","cam_internetinfrastructure":"7","cam_population":"20","cam_impact":"20","cam_easeofexploitation":"9","cam_attackeraccessrequired":"10","cam_scorecurrent":"10.125","cam_scorecurrentwidelyknown":"18.225","cam_scorecurrentwidelyknownexploited":"31.725","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":10.125,"vulnote":null}