Archivi tag: vulnerability

Mozilla Firefox and Thunderbird CVE-2011-2365 Memory Corruption Vulnerability

Mozilla Firefox and Thunderbird CVE-2011-2365 Memory Corruption Vulnerability

Mozilla Firefox and Thunderbird are prone to a remote code-execution vulnerability due to memory-corruption.
Attackers can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.

NOTE: This issue was previously discussed in BID 48354 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2011-19 through -28 Multiple Vulnerabilities) but has been given its own record to better document it.

(Mozilla Firefox e Thunderbird sono soggetti ad una esecuzione di codice remoto a causa di una vulnerabilità di corruzione della memoria.
Gli aggressori possono sfruttare questo problema per eseguire codice arbitrario nel contesto dell’applicazione interessata. Tentativi di exploit riuscito probabilmente porteranno a condizioni di Denial-of-Service.

NOTA: Questo problema è già stato discusso nel BID 48354 – Mozilla Firefox / Thunderbird / SeaMonkey MFSA 2011-19 attraverso -28 Vulnerabilità multiple – ma è stato dato un proprio record per meglio documentarlo.)

La vulnerabilità è applicata a:

Ubuntu Ubuntu Linux 10.10 powerpc
Ubuntu Ubuntu Linux 10.10 i386
Ubuntu Ubuntu Linux 10.10 ARM
Ubuntu Ubuntu Linux 10.10 amd64
Ubuntu Ubuntu Linux 10.04 sparc
Ubuntu Ubuntu Linux 10.04 powerpc
Ubuntu Ubuntu Linux 10.04 i386
Ubuntu Ubuntu Linux 10.04 ARM
Ubuntu Ubuntu Linux 10.04 amd64
SuSE SUSE Linux Enterprise Teradata 10 SP3
SuSE SUSE Linux Enterprise Software Development Kit 11 SP1
SuSE SUSE Linux Enterprise Server 11 SP1
SuSE SUSE Linux Enterprise Server 10 SP4
SuSE SUSE Linux Enterprise Server 10 SP3
SuSE SUSE Linux Enterprise SDK 10 SP4
SuSE SUSE Linux Enterprise SDK 10 SP3
SuSE SUSE Linux Enterprise Desktop 11 SP1
+ Linux kernel 2.6.5
SuSE SUSE Linux Enterprise Desktop 10 SP4
+ Linux kernel 2.6.5
SuSE openSUSE 11.4
SuSE openSUSE 11.3
Slackware Linux 13.37 x86_64
Slackware Linux 13.37
Slackware Linux 13.1 x86_64
Slackware Linux 13.1
Slackware Linux 13.0 x86_64
Slackware Linux 13.0
Slackware Linux -current
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux Optional Productivity Application 5 server
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux Desktop Workstation 5 client
RedHat Enterprise Linux AS 4
RedHat Enterprise Linux Desktop version 4
RedHat Enterprise Linux 5 server
Red Hat Fedora 15
Red Hat Enterprise Linux Workstation Optional 6
Red Hat Enterprise Linux Workstation 6
Red Hat Enterprise Linux Server Optional 6
Red Hat Enterprise Linux Server 6
Red Hat Enterprise Linux HPC Node Optional 6
Red Hat Enterprise Linux Desktop Optional 6
Red Hat Enterprise Linux Desktop 6
Red Hat Enterprise Linux Desktop 5 client
Mozilla Thunderbird 3.1.7
Mozilla Thunderbird 3.1.5
Mozilla Thunderbird 3.1.5
Mozilla Thunderbird 3.1.4
Mozilla Thunderbird 3.0.11
Mozilla Thunderbird 3.0.9
Mozilla Thunderbird 3.0.9
Mozilla Thunderbird 3.0.8
Mozilla Thunderbird 3.0.5
Mozilla Thunderbird 3.0.5
Mozilla Thunderbird 3.0.4
Mozilla Thunderbird 3.0.2
Mozilla Thunderbird 3.0.1
Mozilla Thunderbird 2.0 24
Mozilla Thunderbird 2.0 .9
Mozilla Thunderbird 2.0 .8
Mozilla Thunderbird 2.0 .6
Mozilla Thunderbird 2.0 .5
Mozilla Thunderbird 2.0 .4
Mozilla Thunderbird 2.0 .19
Mozilla Thunderbird 2.0 .17
Mozilla Thunderbird 2.0 .16
Mozilla Thunderbird 2.0 .15
Mozilla Thunderbird 2.0 .14
Mozilla Thunderbird 2.0 .13
Mozilla Thunderbird 2.0 .12
Mozilla Thunderbird 3.1.9
Mozilla Thunderbird 3.1.8
Mozilla Thunderbird 3.1.7
Mozilla Thunderbird 3.1.6
Mozilla Thunderbird 3.1.3
Mozilla Thunderbird 3.1.2
Mozilla Thunderbird 3.1.2
Mozilla Thunderbird 3.1.10
Mozilla Thunderbird 3.1.1
Mozilla Thunderbird 3.1
Mozilla Thunderbird 3.0.7
Mozilla Thunderbird 3.0.6
Mozilla Thunderbird 3.0.4
Mozilla Thunderbird 3.0.3
Mozilla Thunderbird 3.0.11
Mozilla Thunderbird 3.0.10
Mozilla Thunderbird 3.0
Mozilla Thunderbird 2.0.0.23
Mozilla Thunderbird 2.0.0.22
Mozilla Thunderbird 2.0.0.21
Mozilla Thunderbird 2.0.0.18
Mozilla Firefox 3.6.13
Mozilla Firefox 3.6.13
Mozilla Firefox 3.6.10
Mozilla Firefox 3.6.9
Mozilla Firefox 3.6.8
Mozilla Firefox 3.6.6
Mozilla Firefox 3.6.4
Mozilla Firefox 3.6.3
Mozilla Firefox 3.6.2
Mozilla Firefox 3.6.2
Mozilla Firefox 3.5.17
Mozilla Firefox 3.5.16
Mozilla Firefox 3.5.14
Mozilla Firefox 3.5.13
Mozilla Firefox 3.5.10
Mozilla Firefox 3.5.10
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.8
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.6
Mozilla Firefox 3.5.5
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.3
Mozilla Firefox 3.5.2
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5
Mozilla Firefox 3.6.7
Mozilla Firefox 3.6.6
Mozilla Firefox 3.6.17
Mozilla Firefox 3.6.16
Mozilla Firefox 3.6.15
Mozilla Firefox 3.6.14
Mozilla Firefox 3.6.12
Mozilla Firefox 3.6.11
Mozilla Firefox 3.6 Beta 3
Mozilla Firefox 3.6 Beta 2
Mozilla Firefox 3.6
Mozilla Firefox 3.5.19
Mozilla Firefox 3.5.18
Mozilla Firefox 3.5.17
Mozilla Firefox 3.5.15
Mozilla Firefox 3.5.12
Mozilla Firefox 3.5.11
MandrakeSoft Linux Mandrake 2010.1 x86_64
MandrakeSoft Linux Mandrake 2010.1
MandrakeSoft Linux Mandrake 2009.0 x86_64
MandrakeSoft Linux Mandrake 2009.0
MandrakeSoft Enterprise Server 5 x86_64
MandrakeSoft Enterprise Server 5
Debian Linux 6.0 sparc
Debian Linux 6.0 s/390
Debian Linux 6.0 powerpc
Debian Linux 6.0 mips
Debian Linux 6.0 ia-64
Debian Linux 6.0 ia-32
Debian Linux 6.0 arm
Debian Linux 6.0 amd64

Soluzioni:

MandrakeSoft Linux Mandrake 2009.0 x86_64

MandrakeSoft Enterprise Server 5

MandrakeSoft Linux Mandrake 2009.0

Riferimenti:

Annunci

Buffer Overflow di Microsoft Office su documenti RTF

Microsoft Office RTF File Stack Buffer Overflow Vulnerability

Microsoft Office is prone to a remote stack-based buffer-overflow vulnerability because the software fails to perform adequate boundary checks on user-supplied data.
An attacker can exploit this issue by enticing a victim to open a malicious RTF file or view an email in RTF format.
Successfully exploiting this issue would allow the attacker to corrupt memory and execute arbitrary code in the context of the currently logged-in user.

Failed exploit attempts will result in a denial-of-service condition.

(Microsoft Office è soggetto a uno stack-based buffer overflow remoto poiché il software non riesce a eseguire adeguati controlli sui dati forniti.
Un utente malintenzionato può sfruttare questo problema inducendo la vittima ad aprire un file RTF dannoso, o aprire una e-mail in formato RTF.
Sfruttando quanto detto con successo, sarebbe permesso all’attaccante di corrompere la memoria ed eseguire codice arbitrario nel contesto dell’utente attualmente connesso.

Tentativi di exploit falliti si tradurranno in un Denial-of-Service.)

 

La vulnerabilità è applicata a:

Microsoft Open XML File Format Converter for Mac 0 Microsoft Office XP SP3
+ Microsoft Excel 2002 SP3
+ Microsoft Excel 2002 SP3
+ Microsoft FrontPage 2002 SP3
+ Microsoft FrontPage 2002 SP3
+ Microsoft Outlook 2002 SP3
+ Microsoft Outlook 2002 SP3
+ Microsoft PowerPoint 2002 SP3
+ Microsoft PowerPoint 2002 SP3
+ Microsoft Publisher 2002 SP3
+ Microsoft Publisher 2002 SP3

Microsoft Office XP SP2
– Microsoft Windows 2000 Professional SP3
– Microsoft Windows 2000 Professional SP2
– Microsoft Windows 2000 Professional SP1
– Microsoft Windows 2000 Professional
– Microsoft Windows 98
– Microsoft Windows 98SE
– Microsoft Windows ME
– Microsoft Windows NT Workstation 4.0 SP6a
– Microsoft Windows NT Workstation 4.0 SP6
– Microsoft Windows NT Workstation 4.0 SP5
– Microsoft Windows NT Workstation 4.0 SP4
– Microsoft Windows NT Workstation 4.0 SP3
– Microsoft Windows NT Workstation 4.0 SP2
– Microsoft Windows NT Workstation 4.0 SP1
– Microsoft Windows NT Workstation 4.0
– Microsoft Windows XP Home SP1
– Microsoft Windows XP Home
– Microsoft Windows XP Professional SP1
– Microsoft Windows XP Professional

Microsoft Office XP SP1
– Microsoft Windows 2000 Professional SP2
– Microsoft Windows 2000 Professional SP1
– Microsoft Windows 2000 Professional
– Microsoft Windows 98
– Microsoft Windows ME
– Microsoft Windows NT Workstation 4.0 SP6a
– Microsoft Windows NT Workstation 4.0 SP6
– Microsoft Windows NT Workstation 4.0 SP5
– Microsoft Windows NT Workstation 4.0 SP4
– Microsoft Windows NT Workstation 4.0 SP3
– Microsoft Windows NT Workstation 4.0 SP2
– Microsoft Windows NT Workstation 4.0 SP1
– Microsoft Windows NT Workstation 4.0
– Microsoft Windows XP Home
– Microsoft Windows XP Professional

Microsoft Office XP
– Microsoft Windows 2000 Professional SP2
– Microsoft Windows 2000 Professional SP1
– Microsoft Windows 2000 Professional
– Microsoft Windows 98
– Microsoft Windows ME
– Microsoft Windows NT Workstation 4.0 SP6a
– Microsoft Windows NT Workstation 4.0 SP6
– Microsoft Windows NT Workstation 4.0 SP5
– Microsoft Windows NT Workstation 4.0 SP4
– Microsoft Windows NT Workstation 4.0 SP3
– Microsoft Windows NT Workstation 4.0 SP2
– Microsoft Windows NT Workstation 4.0 SP1
– Microsoft Windows NT Workstation 4.0
– Microsoft Windows XP Home
– Microsoft Windows XP Professional

Microsoft Office 2011 for Mac

Microsoft Office 2010 (64-bit edition)

Microsoft Office 2010 (32-bit edition)

Microsoft Office 2010

Microsoft Office 2008 for Mac

Microsoft Office 2007 SP2

Microsoft Office 2007 SP1

Microsoft Office 2007
+ Microsoft Access 2003
+ Microsoft Access 2007
+ Microsoft Excel 2003
+ Microsoft Excel 2007
+ Microsoft Excel 2007
+ Microsoft FrontPage 2003
+ Microsoft Groove 2007
+ Microsoft Groove 2007
+ Microsoft InfoPath 2003
+ Microsoft InfoPath 2007
+ Microsoft InfoPath 2007
+ Microsoft Office Communicator 2007
+ Microsoft OneNote 2003
+ Microsoft Outlook 2003
+ Microsoft Outlook 2007
+ Microsoft Outlook 2007
+ Microsoft PowerPoint 2003
+ Microsoft PowerPoint 2007
+ Microsoft PowerPoint 2007
+ Microsoft Project Professional 2007
+ Microsoft Project Standard 2007
+ Microsoft Publisher 2003
+ Microsoft Publisher 2007
+ Microsoft SharePoint Designer 2007
+ Microsoft Visio Professional 2007
+ Microsoft Visio Professional 2007
+ Microsoft Visio Standard 2007

Microsoft Office 2004 for Mac
Microsoft Office 2003 SP2
Microsoft Office 2003 SP1

Microsoft Office 2003
+ Microsoft Excel 2003
+ Microsoft FrontPage 2003
+ Microsoft InfoPath 2003
+ Microsoft OneNote 2003
+ Microsoft Outlook 2003
+ Microsoft PowerPoint 2003
+ Microsoft Publisher 2003

Codice della vulnerabilità:

http://www.securityfocus.com/data/vulnerabilities/exploits/44652.rb

Microsoft ha fornito le seguenti soluzioni:


Microsoft Office 2008 for Mac

Microsoft Office2008-1228UpdateEN.dmg

Microsoft Office XP SP3

Microsoft officexp-KB2289169-FullFile-ENU.exe

Microsoft Office 2007 SP2

Microsoft Office2007-kb2289158-fullfile-x86-glb.exe

Microsoft Office 2010 (64-bit edition)

Microsoft Office2010-kb2289161-fullfile-x64-glb.exe

Microsoft Office 2011 for Mac

Microsoft Office2011-1401UpdateEN.dmg

Microsoft Office 2010 (32-bit edition)

Riferimenti:

Ovviamente il consiglio da seguire, oltre quello di aprire con cautela eventuali file .RTF soprattutto se spediti via e-mail, è di aggiornare al più presto Office con l’update adatto alla versione utilizzata.