Microsoft PowerPoint 2002 SP3, 2003 SP3, 2007 SP2, and 2010; Office 2004, 2008, and 2011 for Mac; Open XML File Format Converter for Mac; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; PowerPoint Viewer; PowerPoint Viewer 2007 SP2; and PowerPoint Web App do not properly validate PersistDirectoryEntry records in PowerPoint documents, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Slide with a malformed record, which triggers an exception and later use of an unspecified method, aka "Persist Directory RCE Vulnerability."
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11761 | vdb entry signature |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-022 | vendor advisory |
http://www.us-cert.gov/cas/techalerts/TA11-102A.html | third party advisory us government resource |
http://www.securitytracker.com/id?1025340 | vdb entry |
http://www.zerodayinitiative.com/advisories/ZDI-11-125 | |
http://www.securityfocus.com/bid/47251 | vdb entry |
http://www.vupen.com/english/advisories/2011/0941 | vdb entry vendor advisory |
http://osvdb.org/71770 | vdb entry |
http://www.securityfocus.com/archive/1/517482/100/0/threaded | mailing list |