exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ms00-056

ms00-056
Posted Aug 11, 2000

Microsoft Security Bulletin (MS00-056) - Microsoft has released a patch for the "Microsoft Office HTML Object Tag" vulnerability in certain Microsoft Office 2000 products. The vulnerability allows a user to construct a HTML file that, when read, would crash a Microsoft Office 2000 application or run arbitrary code. Affected software includes Microsoft Word 2000, Microsoft Excel 2000, and Microsoft PowerPoint 2000. Microsoft FAQ on this issue available here.

tags | arbitrary
SHA-256 | 39030c4684ecc1e3c972696630c9604a68d7b6ac3ce152dbf6de2893300f1c82

ms00-056

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

Due to a typographical error, the original version of this Bulletin
stated that Word 2000 users who have not applied this patch could
protect themselves by "disabling" Confirm conversion on Open. This
should have read "enabling". We are re-releasing this Bulletin to
correct this error.
======================================================================

Microsoft Security Bulletin (MS00-056)
- - ---------------------------------------

Patch Available for "Microsoft Office HTML Object Tag" Vulnerability
Originally posted: August 09, 2000
Re-released: August 10, 2000

Summary
=======
Microsoft has released a patch that eliminates a security
vulnerability in certain Microsoft (r) Office 2000 products. The
vulnerability could allow a user to construct a HyperText Markup
Language (HTML) file that, when read, would crash a Microsoft Office
2000 application or potentially run arbitrary or malicious code.

Frequently asked questions regarding this vulnerability and the patch
can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-056.asp

Issue
=====
Microsoft Office 2000 applications are capable of reading HTML files
saved as Office documents. A malformed data object tag embedded in
one of these documents could cause the Office application to crash
and allow arbitrary code to be executed.

In order for this behavior to occur, a malicious user would need to
entice a user into opening the malformed Office document. Word 2000
users can protect themselves from opening malformed HTML documents
within Word by enabling "Confirm conversion at Open" from the
Tools-Options-General tab. In addition, Outlook users who have
applied the Outlook Security Update will be prompted before opening
web hosted or mail-borne Office documents.

Affected Software Versions
==========================
- Microsoft Word 2000
- Microsoft Excel 2000
- Microsoft PowerPoint 2000

(These products ship as part of the Office 2000 suite and as
stand-alone products)

Note: Previous versions of these products are not affected by this
vulnerability.

Note: Office 2000 products other than those specifically listed above
are not affected by this vulnerability.

Patch Availability
==================
- Microsoft Word 2000, Excel 2000, PowerPoint 2000:
http://officeupdate.microsoft.com/2000/downloadDetails/Of9data.htm

Note: Office 2000 SR-1 is required before this patch can be applied.

Note: Additional security patches are available at the Microsoft
Download Center

More Information
================
Please see the following references for more information related to
this issue.
- Frequently Asked Questions: Microsoft Security Bulletin MS00-056,
http://www.microsoft.com/technet/security/bulletin/fq00-056.asp
- Microsoft Knowledge Base (KB) article Q269880
http://www.microsoft.com/technet/support/kb.asp?ID=269880
- Microsoft TechNet Security web site,
http://www.microsoft.com/technet/security/default.asp

Obtaining Support on this Issue
===============================
This is a fully supported patch. Information on contacting Microsoft
Product Support Services is available at
http://support.microsoft.com/support/contact/default.asp.

Acknowledgments
===============
Microsoft thanks Jesper M. Johansson for reporting this issue to us
and working with us to protect customers.

Revisions
- August 09, 2000: Bulletin Created.
- August 10, 2000: Bulletin updated to change 'disabling'
to 'enabling' in the second paragraph under Issue.

- - -------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO
THE FOREGOING LIMITATION MAY NOT APPLY.

(c) 2000 Microsoft Corporation. All rights reserved. Terms of use.



-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.5.3

iQEVAwUBOZNcoI0ZSRQxA/UrAQFV6wf/SU15gXpPRIHcr7iZkkjmQ4Qh99E2Hb2w
pCil7EblF3KshnQQ6ZliWk0sIwI78qu9dNl0BzzNGgEFAEIuWud7qiAQHZcAwsnt
Agjmka6j5fC3z9pgQd7zr1lXqk+yBskY4AHOsviLo1aLhaF5snb75PHgukVNwRrG
YFA7O16zTVpwI6fjcdMSzPrk06a3//ahvPoRLY387tgaa+zvCVb7+GjAYsTKBCjB
zINZgghjpK1ZB2N9QR4Jj/8wnxsiP0NgLXyQTRLvYlqJk+5+ShLaaRoqQdJfLsFE
LZDZ2tBsICE6aZfkDCNDI+/786eiKkWNJbVtl1/CeLqIhNNK/8ki/w==
=ad9o
-----END PGP SIGNATURE-----

*******************************************************************
You have received this e-mail bulletin as a result of your registration
to the Microsoft Product Security Notification Service. You may
unsubscribe from this e-mail notification service at any time by sending
an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM
The subject line and message body are not used in processing the request,
and can be anything you like.

To verify the digital signature on this bulletin, please download our PGP
key at http://www.microsoft.com/technet/security/notify.asp.

For more information on the Microsoft Security Notification Service
please visit http://www.microsoft.com/technet/security/notify.asp. For
security-related information about Microsoft products, please visit the
Microsoft Security Advisor web site at http://www.microsoft.com/security.
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close