安全研究

安全漏洞
Microsoft Office执行跳转内存破坏漏洞(MS08-013)

发布日期:2008-02-12
更新日期:2008-02-18

受影响系统:
Microsoft Office XP SP3
Microsoft Office 2004 for Mac
Microsoft Office 2003 Service Pack 2
Microsoft Office 2000 Service Pack 3
描述:
BUGTRAQ  ID: 27738
CVE(CAN) ID: CVE-2008-0103

Microsoft Office是非常流行的办公软件套件。

Microsoft Office在处理注入了畸形对象的Office文件时存在内存破坏漏洞,如果用户受骗打开了特制的Office文件的话,就可能触发这个漏洞,导致执行任意指令。

<*来源:Shaun Colley (shaunige@yahoo.co.uk
  
  链接:http://secunia.com/advisories/28909/
        http://www.us-cert.gov/cas/techalerts/TA08-043C.html
        http://www.microsoft.com/technet/security/Bulletin/MS08-013.mspx?pf=true
*>

建议:
临时解决方法:

* 限制对VBE6.dll的访问,在命令行键入:
    
Windows XP:

Echo y|cacls "%ProgramFiles%\common files\microsoft shared\vba\vba6\vbe6.dll" /E /P everyone:N

Windows Vista:

Takeown.exe /f "%ProgramFiles%\common files\microsoft shared\vba\vba6\vbe6.dll"
Icacls.exe "%ProgramFiles%\common files\microsoft shared\vba\vba6\vbe6.dll" /save %TEMP%\VBE6_ACL.TXT
Icacls.exe "%ProgramFiles%\common files\microsoft shared\vba\vba6\vbe6.dll" /deny everyone:(F)

厂商补丁:

Microsoft
---------
Microsoft已经为此发布了一个安全公告(MS08-013)以及相应补丁:
MS08-013:Vulnerability in Microsoft Office Could Allow Remote Code Execution (947108)
链接:http://www.microsoft.com/technet/security/Bulletin/MS08-013.mspx?pf=true

浏览次数:2718
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障