TITLE: Microsoft Office Publisher File Parsing Buffer Overflow Vulnerability Highly critical Impact: System access Where: From remote VERIFY ADVISORY: http://secunia.com/advisories/39375/ DESCRIPTION: A vulnerability has been reported in Microsoft Office Publisher, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the TextBox conversion functionality for Publisher 97 format files. This can be exploited to cause a buffer overflow via a specially crafted Publisher file. Successful exploitation allows execution of arbitrary code. SOLUTION: Apply patches. Microsoft Office Publisher 2002 SP3: http://www.microsoft.com/downloads/details.aspx?familyid=943b3830-70d5-46c5-bffc-1b494434b5f7 Microsoft Office Publisher 2003 SP3: http://www.microsoft.com/downloads/details.aspx?familyid=7c2f4610-77bb-4d72-847b-1a06c523b137 Microsoft Office Publisher 2007 SP1/SP2: http://www.microsoft.com/downloads/details.aspx?familyid=10ca2f71-0ab2-4344-b7fd-bbbd6a783a96 ORIGINAL ADVISORY: MS10-023 (KB980466, KB980469, KB980470): http://www.microsoft.com/technet/security/bulletin/MS10-023.mspx ZDI: http://www.zerodayinitiative.com/advisories/ZDI-10-069/ ========================= The list's FAQ's can be seen by sending an email to PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line. To unsubscribe, subscribe, set Digest or Vacation to on or off, go to //www.freelists.org/list/pcworks . You can also send an email to PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line. Your member list settings can be found at //www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks . Once logged in, you have access to numerous other email options. The list archives are located at //www.freelists.org/archives/pcworks/ . All email posted to the list will be placed there in the event anyone needs to look for previous posts. -zxdjhu-