{"vuid":"VU#936945","idnumber":"936945","name":"Microsoft PowerPoint does not properly handle malformed shapes","keywords":["Microsoft","PowerPoint","arbitrary code execution","PPDDropper.B","PPT","ms06-aug","mso.dll","shape"],"overview":"Microsoft PowerPoint contains a vulnerability that may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Microsoft PowerPoint contains a vulnerability that could be exploited when PowerPoint opens a specially crafted document. According to Microsoft Security Bulletin MS06-048, \"The vulnerability is caused when PowerPoint opens a specially crafted PowerPoint file and parses a malformed shape. This vulnerability affects both Windows and Mac versions of PowerPoint.","impact":"By convincing a user to open a specially crafted PowerPoint document, an attacker could execute arbitrary code with the privileges of the user running PowerPoint. If the user is logged in with administrative privileges, the attacker could take complete control of a vulnerable system. Depending on the version and patch level of PowerPoint, this vulnerability may cause PowerPoint to crash.","resolution":"Apply an update This vulnerability is addressed by the updates documented in Microsoft Security Bulletin MS06-048.","workarounds":"Do not open untrusted PowerPoint documents Do not open unfamiliar or unexpected PowerPoint or other Office documents, particularly those hosted on web sites or delivered as email attachments. Please see Cyber Security Tip ST04-010. Do not rely on file name extension filtering In most cases, Windows will call PowerPoint to open a document even if the document has an unknown file extension. For example, if presentation.qwer contains the correct file header information, Windows will open presentation.qwer with PowerPoint. Filtering for common extensions (e.g., .ppt, .pot, and .pps) will not detect all PowerPoint documents. Additionally, a PowerPoint file with no file extension will also open with the PowerPoint application.","sysaffected":"","thanks":"Microsoft credits Elia Florio of Symantec, Dejun Meng of the Fortinet Security Research Team, and Shih-hao Weng of Information & Communication Security Technology Center for reporting the Microsoft PowerPoint Mso.dll Vulnerability.","author":"This document was written by Will Dormann.","public":["http://www.microsoft.com/technet/security/bulletin/ms06-048.mspx","http://www.microsoft.com/technet/security/advisory/922970.mspx","http://www.securityfocus.com/bid/18957","http://securityresponse.symantec.com/avcenter/venc/data/trojan.ppdropper.b.html","http://secunia.com/advisories/21040/","http://isc.sans.org/diary.php?storyid=1484","http://securitytracker.com/alerts/2006/Jul/1016496.html","http://blogs.securiteam.com/?p=508"],"cveids":["CVE-2006-3590"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-07-13T19:54:13Z","publicdate":"2006-07-13T00:00:00Z","datefirstpublished":"2006-07-14T16:02:48Z","dateupdated":"2006-10-05T08:37:56Z","revision":13,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"20","cam_exploitation":"12","cam_internetinfrastructure":"8","cam_population":"17","cam_impact":"14","cam_easeofexploitation":"7","cam_attackeraccessrequired":"18","cam_scorecurrent":"22.491","cam_scorecurrentwidelyknown":"22.491","cam_scorecurrentwidelyknownexploited":"26.9892","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":22.491,"vulnote":null}