Zero-Day Advisory
Improper Memory Access Vulnerability in Multiple Microsoft Office Products
Summary
Fortinet's FortiGuard Labs has discovered improper memory access vulnerability in Multiple Microsoft Office Products.
Solutions
FortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:MS.Office.Filters.Image.Handling.Multiple.Code.Execution
Released Aug 16, 2006
Users should apply the solution provided by Microsoft.
Additional Information
There is a bug in Microsoft Portable Network Graphics Import Filter, which is used in many Windows products, and is located in C:\Program Files\Common Files\Microsoft Shared\Grphflt\PNG32.FLT.An attacker may construct a malformed .png file. When users open it using a software which uses PNG32.FLT, such as Microsoft Photo Editor, the software will cause memory access violation. If specially crafted, it may cause execution of arbitrary code. This bug is due to manipulation of IDAT Image Data in PNG file.
Acknowledgement
Dejun Meng of Fortinet Security Research Team