{"vuid":"VU#884252","idnumber":"884252","name":"Microsoft PowerPoint fails to properly handle malformed records","keywords":["Microsoft","PowerPoint","remote code execution","parse","malformed record","ms06-aug"],"overview":"Microsoft PowerPoint fails to properly handle malformed records, allowing a buffer overflow to occur. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Microsoft PowerPoint fails to properly handle malformed records. Specifically, PowerPoint fails to properly validate the length of a record before copying that record into a buffer possibly allowing a buffer overflow to occur. More information is available in Microsoft Security Bulletin MS06-048.","impact":"A  remote, unauthenticated attacker could execute arbitrary code on an affected system. If the user is logged on with administrative privileges, the attacker could gain complete control of the system, including the ability to install programs; view, change, or delete data; or create new accounts with full user rights.","resolution":"Apply an update\nApply the update provided by in Microsoft Security Bulletin MS06-048.","workarounds":"Until a patch can be applied, do not open or save Microsoft PowerPoint files that you receive from untrusted sources.","sysaffected":"","thanks":"This vulnerability was reported by Microsoft, who in turn c\nredit \nSoWhat of \nNevis Labs f\nor reporting this vulnerability.","author":"This document was written by Joseph Pruszynski.","public":["h","t","t","p",":","/","/","w","w","w",".","m","i","c","r","o","s","o","f","t",".","c","o","m","/","t","e","c","h","n","e","t","/","s","e","c","u","r","i","t","y","/","b","u","l","l","e","t","i","n","/","m","s","0","6","-","0","4","8",".","m","s","p","x"],"cveids":["CVE-2006-3449"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-08-08T18:09:35Z","publicdate":"2006-08-08T00:00:00Z","datefirstpublished":"2006-08-08T23:31:33Z","dateupdated":"2006-08-08T23:31:43Z","revision":23,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"10","cam_exploitation":"0","cam_internetinfrastructure":"8","cam_population":"20","cam_impact":"15","cam_easeofexploitation":"18","cam_attackeraccessrequired":"17","cam_scorecurrent":"30.9825","cam_scorecurrentwidelyknown":"48.195","cam_scorecurrentwidelyknownexploited":"82.62","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":30.9825,"vulnote":null}