{"vuid":"VU#926676","idnumber":"926676","name":"Microsoft WordPad Text Converter vulnerable to remote code execution","keywords":["Microsoft","WordPad Text Converter","arbitrary code execution","Microsoft Security Advisory 960906"],"overview":"The WordPad Text Converter for Word 97 files included in some versions of Windows contains an unspecified error which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Microsoft WordPad is a text editor included by default with the Windows operating system. It includes WordPad Text Converters that allow users who do not have Microsoft Word installed to open documents in older file formats, including Microsoft Office Word 97. An unspecified error in the way that the WordPad Text Converter for Word 97 handles files in this format results in memory corruption that could allow an attacker to execute arbitrary code. Microsoft Office Word 97 files may have file extensions such as .doc, .wri, or .rtf. While Microsoft Office Word has the ability to open Office Word 97 files, it is not affected by this vulnerability. However, in the default configuration, Windows will open files having the .wri extension with WordPad. Therefore, it is likely that systems that have Microsoft Office Word installed will still open a malicious Microsoft Office Word 97 document with this extension using the affected WordPad. Microsoft notes that Windows XP Service Pack 3, Windows Vista and Windows Vista Service Pack 1 (including x64 editions), and Windows Server 2008 are not affected by this vulnerability. This vulnerability is currently being exploited in the wild.","impact":"By convincing a user to view a specially crafted Word 97 document (e.g., an attachment supplied in email), a remote attacker may be able to execute arbitrary commands with the privileges of the user.","resolution":"We are currently unaware of a practical solution to this problem.","workarounds":"Disable the WordPad Text Converter for Word 97 file format Microsoft has included instructions for disabling the affected component in Microsoft Security Advisory (960906).","sysaffected":"","thanks":"","author":"This document was written by Chad R Dougherty.","public":["h","t","t","p",":","/","/","w","w","w",".","m","i","c","r","o","s","o","f","t",".","c","o","m","/","t","e","c","h","n","e","t","/","s","e","c","u","r","i","t","y","/","a","d","v","i","s","o","r","y","/","9","6","0","9","0","6",".","m","s","p","x"],"cveids":["CVE-2008-4841"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2008-12-10T14:06:30Z","publicdate":"2008-12-09T00:00:00Z","datefirstpublished":"2008-12-11T14:14:29Z","dateupdated":"2008-12-11T18:59:15Z","revision":12,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"17","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"18","cam_impact":"15","cam_easeofexploitation":"4","cam_attackeraccessrequired":"20","cam_scorecurrent":"6.885","cam_scorecurrentwidelyknown":"8.1","cam_scorecurrentwidelyknownexploited":"16.2","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":6.885,"vulnote":null}