Thought I would send this along in case some of you did not get it . Lionel. ------------------------------------------------------------------------- FIGHT BACK AGAINST SPAM! Download Spam Inspector, the Award Winning Anti-Spam Filter http://mail.giantcompany.com ----- Original Message ----- From: "Microsoft" <0_51915_C8FF513D-EDB5-B44D-83E5-CF713652B20B_AU@xxxxxxxxxxxxxxxxxxxxxxxxx> To: <percy10@xxxxxxxxxxxxxxx> Sent: Thursday, September 04, 2003 7:20 AM Subject: Microsoft Security Bulletin MS03-037: Flaw in Visual Basic for Applications Could Allow Arbitrary Code Execution(822715) > -----BEGIN PGP SIGNED MESSAGE----- > > - ---------------------------------------------------------------------- > Title: Flaw in Visual Basic for Applications Could Allow > Arbitrary Code Execution (822715) > Date: 03 September 2003 > > Affected Software: > Microsoft Visual Basic for Applications SDK 5.0 > Microsoft Visual Basic for Applications SDK 6.0 > Microsoft Visual Basic for Applications SDK 6.2 > Microsoft Visual Basic for Applications SDK 6.3 > > Products which include the affected software: > Microsoft Access 97 > Microsoft Access 2000 > Microsoft Access 2002 > Microsoft Excel 97 > Microsoft Excel 2000 > Microsoft Excel 2002 > Microsoft PowerPoint 97 > Microsoft PowerPoint 2000 > Microsoft PowerPoint 2002 > Microsoft Project 2000 > Microsoft Project 2002 > Microsoft Publisher 2002 > Microsoft Visio 2000 > Microsoft Visio 2002 > Microsoft Word 97 > Microsoft Word 98(J) > Microsoft Word 2000 > Microsoft Word 2002 > Microsoft Works Suite 2001 > Microsoft Works Suite 2002 > Microsoft Works Suite 2003 > Microsoft Business Solutions Great Plains 7.5 > Microsoft Business Solutions Dynamics 6.0 > Microsoft Business Solutions Dynamics 7.0 > Microsoft Business Solutions eEnterprise 6.0 > Microsoft Business Solutions eEnterprise 7.0 > Microsoft Business Solutions Solomon 4.5 > Microsoft Business Solutions Solomon 5.0 > Microsoft Business Solutions Solomon 5.5 > > Impact: Run code of attackers choice > Max Risk: Critical > Bulletin: MS03-037 > > Microsoft encourages customers to review the Security Bulletins > at: > http://www.microsoft.com/technet/security/bulletin/MS03-037.asp > http://www.microsoft.com/security/security_bulletins/ms03-037.asp > - ---------------------------------------------------------------------- > > Issue: > ====== > Microsoft VBA is a development technology for developing client > desktop packaged applications and integrating them with existing > data and systems. Microsoft VBA is based on the Microsoft Visual > Basic development system. Microsoft Office products include VBA > and make use of VBA to perform certain functions. VBA can also be > used to build customized applications based around an existing > host application. > > A flaw exists in the way VBA checks document properties passed to > it when a document is opened by the host application. A buffer > overrun exists which if exploited successfully could allow an > attacker to execute code of their choice in the context of the > logged on user. > > In order for an attack to be successful, a user would have to > open a specially crafted document sent to them by an attacker. > This document could be any type of document that supports VBA, > such as a Word document, Excel spreadsheet, PowerPoint > presentation. In the case where Microsoft Word is being used as > the HTML e-mail editor for Microsoft Outlook, this document could > be an e-mail, however the user would need to reply to, or forward > the mail message in order for the vulnerability to be exploited. > > Mitigating Factors: > ==================== > - -The user must open a document sent to them by an attacker in > order for this vulnerability to be exploited. > - -When Microsoft Word is being used as the HTML e-mail editor in > Outlook, a user would need to reply to or forward a malicious e- > mail document sent to them in order for this vulnerability to be > exploited. > - -An attacker's code could only run with the same rights as the > logged on user. The specific privileges the attacker could gain > through this vulnerability would therefore depend on the > privileges granted to the user. Any limitations on a user's > account, such as those applied through Group Policies, would also > limit the actions of any arbitrary code executed by this > vulnerability. > > Risk Rating: > ============ > - Critical > > Patch Availability: > =================== > - A patch is available to fix this vulnerability. Please read > the Security Bulletins at > http://www.microsoft.com/technet/security/bulletin/ms03-037.asp > http://www.microsoft.com/security/security_bulletins/ms03-037.asp > for information on obtaining this patch. > > Acknowledgment: > =============== > - eEye Digital Security, http://www.eeye.com > > - --------------------------------------------------------------------- > > THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS > PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT > DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING > THE > WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR > PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS > BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, > INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL > DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN > ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT > ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL > OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. > > -----BEGIN PGP SIGNATURE----- > Version: PGP 7.1 > > iQEVAwUBP1Y7no0ZSRQxA/UrAQFW9Af/R8I0BzShSIs6JIz+tl/BKj6inGbX0Sde > HIJ0dwziLnxQZpcRCow2HPGFM1yQjIXuu7PGtjBrPYfn5pmSKmJvvNk0ZDKKyQmL > 9t+/Bs+aGsdllF4BeAiFGYTnRgxEUlMFM9/GJbKaOFUBGhfRLHtv4IEUqb7tqFG4 > byoa7h3mOTijlbuE8SKHF6rbGGOAyhAbK4h8f8+tqjQ4PllNo9wSJLcTCg7HkdVv > Vp2VkUPAXiRLBKZUkdpa1OgZ7g7znze1yC4g8/n5WVinknW8uHH0krRNQDvEQmU1 > rb5N1+OTosd2JqTW/WXs1PE5XRYYd36ULcOO9f8TQpKp6kQNxKRC3A== > =SCfU > -----END PGP SIGNATURE----- > > > ******************************************************************* > > You have received this e-mail bulletin because of your subscription to the Microsoft Product Security Notification Service. For more information on this service, please visit http://www.microsoft.com/technet/security/notify.asp. > > To verify the digital signature on this bulletin, please download our PGP key at http://www.microsoft.com/technet/security/notify.asp. > > To unsubscribe from the Microsoft Security Notification Service, please visit the Microsoft Profile Center at http://register.microsoft.com/regsys/pic.asp > > If you do not wish to use Microsoft Passport, you can unsubscribe from the Microsoft Security Notification Service via email as described below: > Reply to this message with the word UNSUBSCRIBE in the Subject line. > > For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site at http://www.microsoft.com/security. To unsub or change your email settings: //www.freelists.org/webpage/pctechtalk To access our Archives: http://groups.yahoo.com/group/PCTechTalk/messages/ //www.freelists.org/archives/pctechtalk/ For more info: //www.freelists.org/cgi-bin/list?list_id=pctechtalk