Fortinet's FortiGuard Labs has discovered a DLL loading vulnerability in Microsoft Office Powerpoint, which allows a remote attacker to compromise a system through a malicious DLL.
Remote Code Execution
For a list of affected software, please refer to the Microsoft Security Bulletin reference below.
One DLL pre-loading vulnerability was discovered in Microsoft Office Powerpoint (CVE-2010-3337).
A remote code execution vulnerability exists in the way that Microsoft Office handles the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This vulnerability requires a user to open a document contained within the same working directory as a specially crafted DLL file. The specially crafted DLL will be loaded into memory giving the attacker control of the affected system in the security context of the logged-on user.
- Users should apply the solution provided by Microsoft.
- Haifei Li of Fortinet's FortiGuard Labs